An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks.
Eun-Hee JeongByung kwan LeePublished in: Future Gener. Comput. Syst. (2014)
Keyphrases
- network attacks
- intrusion detection
- ip address
- network layer
- ddos attacks
- data mining
- internet protocol
- network intrusion detection
- dos attacks
- hash table
- end to end
- tcp ip
- ip networks
- network security
- application layer
- intrusion detection system
- label switching
- ip addresses
- network devices
- lightweight
- anomaly detection
- network traffic
- computer networks
- data mining techniques
- data structure
- fraud detection
- association rules
- data warehouse
- wireless sensor networks
- hash functions
- routing protocol
- quality of service
- data model
- social networks