Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring.
Florian WilkensSteffen HaasJohanna AmannMathias FischerPublished in: CoRR (2021)
Keyphrases
- network security
- situation assessment
- secure communication
- network monitoring
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- wireless sensor
- information security
- monitoring system
- risk assessment
- security protection
- network traffic
- dos attacks
- network intrusion
- anomaly detection
- security breaches
- real time
- security policies
- anti phishing
- packet filtering
- data mining
- cyber security
- network intrusion detection
- secret key
- decision support