Improving architectures for automating network security using specification-based protocols.
Khir HendersonKevin T. KornegayPublished in: HotSoS (2020)
Keyphrases
- network security
- computer networks
- intrusion detection
- intrusion detection system
- wired networks
- traffic analysis
- anomaly detection
- risk assessment
- network traffic
- dos attacks
- information security
- security protection
- security policies
- situation assessment
- computer security
- anti phishing
- network intrusion
- network administrators
- security breaches
- ip networks
- decision making
- secure communication
- machine learning
- packet filtering