Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security.
Charles V. WrightChristopher ConnellyTimothy BrajeJesse C. RabekLee M. RosseyRobert K. CunninghamPublished in: RAID (2010)
Keyphrases
- computer security
- network traffic
- high fidelity
- intrusion detection
- anomaly detection
- network security
- intrusion detection system
- network intrusion detection
- computer systems
- computer networks
- real time
- traffic data
- information security
- database systems
- data mining
- high resolution
- internet traffic
- ip addresses
- long range dependence
- access patterns
- data processing
- data mining techniques