A flexible architecture for orchestrating network security functions to support high-level security policies.
Sanghak OhEunsoo KimJaehoon (Paul) JeongHoon KoHyoungshick KimPublished in: IMCOM (2017)
Keyphrases
- network security
- security policies
- high level
- computer networks
- intrusion detection
- security management
- traffic analysis
- intrusion detection system
- network management
- risk assessment
- anomaly detection
- dos attacks
- information security
- security requirements
- network traffic
- access control
- security breaches
- cyber attacks
- access control systems
- computer security
- access control policies
- distributed systems
- security protection
- situation assessment
- anti phishing
- network administrators
- decision support
- data mining
- real world