Login / Signup
Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion.
Zixuan Chen
Chao Zheng
Zhao Li
Jinqiao Shi
Zeyu Li
Published in:
CSCWD (2024)
Keyphrases
</>
alert correlation
intrusion detection
malicious users
intrusion detection system
attack scenarios
shortest path
denial of service attacks
authentication scheme
detection mechanism
correlation coefficient
network intrusion
neural network
flow field
network security
countermeasures
normal behavior