Removing the Reliance on Perimeters for Security using Network Views.
Iffat AnjumDaniel KosteckiEthan LebaJessica SokalRajit BharambeWilliam EnckCristina Nita-RotaruBradley ReavesPublished in: SACMAT (2022)
Keyphrases
- network management
- security threats
- security protection
- multiple views
- intrusion prevention
- cyber attacks
- security measures
- network model
- network structure
- database
- intrusion detection
- access control
- network administrators
- enterprise network
- network architecture
- fault injection
- security issues
- network access
- forensic analysis
- application level
- denial of service attacks
- network monitoring
- wireless sensor
- network topologies
- rfid tags
- computer networks
- information security
- peer to peer
- social networks