Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities.
Thomas E. DanielsEugene H. SpaffordPublished in: J. Comput. Secur. (1999)
Keyphrases
- low level
- countermeasures
- security vulnerabilities
- security flaws
- security risks
- high level
- security mechanisms
- higher level
- network attacks
- dos attacks
- detection algorithm
- denial of service
- normal traffic
- detection method
- detecting malicious
- security breaches
- data corruption
- normal behavior
- lower level
- ip addresses
- visual cues
- intrusion detection
- information security
- authentication scheme
- security protocols
- computer security
- network security
- low level features