Mining TCP/IP packets to detect stepping-stone intrusion.
Jianhua YangShou-Hsuan Stephen HuangPublished in: Comput. Secur. (2007)
Keyphrases
- tcp ip
- ip networks
- protocol stack
- network security
- ip address
- computer networks
- intrusion detection
- local area network
- internet protocol
- intrusion detection system
- wide area network
- data mining
- real time
- mobile networks
- anomaly detection
- data mining techniques
- traffic analysis
- quality of service
- network traffic
- smart card
- sensor networks