Login / Signup
Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach.
Fábio Elias Locatelli
Luciano Paschoal Gaspary
Cristina Melchiors
Samir Lohmann
Fabiane Dillenburg
Published in:
DSOM (2004)
Keyphrases
</>
intrusion detection
intrusion detection system
network security
network traffic
anomaly detection
computer networks
attack scenarios
database
keyword spotting
alert correlation
log data
expert systems
data mining
sign language
log analysis
network intrusion
real world