Automatic generation of extended dependency graphs for network security.
Heiko GüntherMarko JahnkePublished in: LCN (2012)
Keyphrases
- network security
- dependency graphs
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- network traffic
- security policies
- information security
- computer security
- dependency graph
- anomaly detection
- security protection
- risk assessment
- dos attacks
- situation assessment
- network intrusion
- ip networks
- security breaches
- end hosts
- data mining
- wired networks
- network monitoring
- anti phishing
- denial of service
- dimensionality reduction
- information technology
- packet filtering
- real world