Protecting shared information in networks: a network security game with strategic attacks.
Bram de WittePaolo FrascaBastiaan OvervestJudith TimmerPublished in: CoRR (2019)
Keyphrases
- network security
- shared information
- traffic analysis
- computer networks
- dos attacks
- network intrusion
- end hosts
- security breaches
- computer security
- network attacks
- intrusion detection system
- security risks
- denial of service
- intrusion detection
- wired networks
- network traffic
- network administrators
- information security
- internet traffic
- security policies
- denial of service attacks
- anomaly detection
- ip addresses
- network management
- decision making
- misuse detection
- knowledge management
- information technology