A Survey of Network Attacks Based on Protocol Vulnerabilities.
Gang XiongJiayin TongYe XuHongliang YuYong ZhaoPublished in: APWeb Workshophs (2014)
Keyphrases
- network attacks
- intrusion detection
- dos attacks
- security vulnerabilities
- network intrusion detection
- intrusion detection system
- lightweight
- attack scenarios
- denial of service attacks
- information security
- network security
- network intrusions
- cryptographic protocols
- anomaly detection
- network traffic
- database systems
- security issues
- security protocols
- peer to peer
- data warehouse
- information retrieval
- machine learning