Configurable Middleware-Level Intrusion Detection for Embedded Systems.
Eivind NaessDeborah A. FrinckeA. David McKinnonDavid E. BakkenPublished in: ICDCS Workshops (2005)
Keyphrases
- intrusion detection
- embedded systems
- intrusion detection system
- anomaly detection
- network traffic
- network security
- high detection rate
- network intrusion detection
- low cost
- embedded devices
- embedded software
- artificial immune
- information security
- software systems
- detecting anomalous
- data mining
- data mining techniques
- field programmable gate array
- cyber security
- distributed systems
- alert correlation
- expectation maximization
- fraud detection
- communication technologies
- data processing
- mobile devices
- data analysis