A declarative approach for global network security configuration verification and evaluation.
Mohammad Ashiqur RahmanEhab Al-ShaerPublished in: Integrated Network Management (2011)
Keyphrases
- network security
- computer networks
- intrusion detection
- traffic analysis
- intrusion detection system
- computer security
- anomaly detection
- information security
- network traffic
- situation assessment
- risk assessment
- security breaches
- security policies
- dos attacks
- security protection
- anti phishing
- network administrators
- ip networks
- learning algorithm
- end hosts
- wired networks
- distributed systems
- information retrieval
- real world