Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN.
Phan The DuyHien Do HoangNghi Hoang KhoaDo Thi Thu HienVan-Hau PhamPublished in: ISCIT (2022)
Keyphrases
- intrusion detection
- cyber security
- moving target defense
- intrusion detection system
- anomaly detection
- network intrusion detection
- network traffic
- network security
- high detection rate
- detecting anomalous
- data mining
- information security
- computer security
- false positives and false negatives
- critical infrastructure
- artificial immune
- network intrusions
- cyber attacks
- network intrusion
- alert correlation
- credit card fraud detection
- network attacks
- information retrieval
- intrusion prevention
- databases
- machine learning
- data mining techniques