Network Security Evaluation Based on Simulation of Malfactor's Behavior.
Igor V. KotenkoMikhail StepashkinPublished in: SECRYPT (2006)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- dos attacks
- information security
- risk assessment
- anomaly detection
- security policies
- anti phishing
- security protection
- situation assessment
- network traffic
- network intrusion
- security breaches
- computer security
- network intrusion detection
- network administrators
- end hosts
- databases