APEX: Characterizing Attack Behaviors from Network Anomalies.
Kushan Sudheera Kalupahana LiyanageTian ZixuDinil Mon DivakaranMun Choon ChanMohan GurusamyPublished in: IPCCC (2022)
Keyphrases
- network intrusion
- network attacks
- intrusion detection
- anomaly detection
- network anomaly detection
- network traffic
- network intrusion detection
- network structure
- cyber attacks
- data transfer
- network architecture
- network topologies
- denial of service attacks
- communication networks
- computer networks
- buffer overflow
- attack graphs