A Novel Methodology for Malware Intrusion Attack Path Reconstruction.
Ahmed F. ShoshaJoshua JamesPavel GladyshevPublished in: ICDF2C (2011)
Keyphrases
- attack scenarios
- intrusion detection system
- intrusion detection
- malicious users
- alert correlation
- attack detection
- three dimensional
- detect malicious
- network security
- denial of service attacks
- network intrusion
- compressive sensing
- image reconstruction
- shortest path
- high resolution
- network attacks
- network intrusions
- malware detection
- database systems