Training network managers in ethical hacking techniques to manage resource starvation attacks using GNS3 simulator.
Kemal HajdarevicAdna KozicIndira AvdagicZerina MaseticNejdet DogruPublished in: ICAT (2017)
Keyphrases
- security threats
- traffic analysis
- recurrent networks
- information systems
- network anomaly detection
- denial of service attacks
- peer to peer
- ddos attacks
- computer networks
- neural network
- security issues
- radial basis function network
- network resources
- security mechanisms
- network structure
- countermeasures
- resource management
- network traffic
- resource allocation
- information technology
- intrusion prevention
- training process
- key management
- simulation model
- wireless sensor networks
- security risks
- fault injection
- decision making