Performance Analysis of Snort using Network Function Virtualization.
Maham QayyumWajeeha HamidMunam Ali ShahPublished in: ICAC (2018)
Keyphrases
- intrusion detection system
- peer to peer
- computer networks
- network intrusion detection
- wireless sensor networks
- cloud computing
- network traffic
- cloud computing environment
- network topologies
- network attacks
- high availability
- network design
- network model
- operating system
- distributed computing
- tcp ip
- network devices
- artificial neural networks