FRID: Flood Attack Mitigation Using Resources Efficient Intrusion Detection Techniques in Delay Tolerant Networks.
Waqar KhalidNaveed AhmedMuhammad KhalidAziz Ud DinAurangzeb KhanMuhammad ArshadPublished in: IEEE Access (2019)
Keyphrases
- intrusion detection
- delay tolerant
- network intrusion
- intrusion detection system
- anomaly detection
- network intrusions
- alert correlation
- network intrusion detection
- network traffic
- network security
- network attacks
- social networks
- normal behavior
- network resources
- computer networks
- misuse detection
- information security
- data mining techniques
- data mining
- end to end delay
- computing resources
- wireless sensor networks
- association rules