Verification and Optimization of Network Security Defense System from the Perspective of Blue Army in Actual Offensive and Defensive Exercises.
Zhouyuan LiaoZhenhong ZhangYing YanPublished in: Scalable Comput. Pract. Exp. (2024)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- network traffic
- security policies
- security breaches
- traffic analysis
- information security
- risk assessment
- anomaly detection
- computer security
- dos attacks
- ip networks
- network intrusion
- security protection
- situation assessment
- denial of service
- wired networks
- machine learning
- anti phishing
- network administrators
- feature selection
- information systems