Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances.
Moonzoo KimPublished in: ATVA (2007)
Keyphrases
- network security
- high availability
- packet filtering
- end hosts
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- fault tolerance
- network traffic
- fault tolerant
- dos attacks
- anomaly detection
- ip networks
- information security
- oracle database
- distributed databases
- lightweight
- risk assessment
- denial of service attacks
- high dimensional
- digital libraries
- object oriented