Intrusion-Detection Policies for IT Security Breaches.
Hulisi OgutHuseyin CavusogluSrinivasan RaghunathanPublished in: INFORMS J. Comput. (2008)
Keyphrases
- security breaches
- intrusion detection
- network security
- cyber security
- intrusion detection system
- cyber attacks
- anomaly detection
- network traffic
- network intrusion detection
- security policies
- data mining
- dos attacks
- data mining techniques
- detecting anomalous
- information security
- computer networks
- alert correlation
- network intrusions
- intrusion prevention
- critical infrastructure
- traffic data
- smart grid
- network attacks
- lightweight