Could Network View Inconsistency Affect Virtualized Network Security Functions?
Mohamed AslanAshraf MatrawyPublished in: CoRR (2017)
Keyphrases
- network security
- traffic analysis
- computer networks
- network administrators
- network traffic
- end hosts
- network access
- network intrusion
- packet filtering
- security protection
- intrusion detection
- situation assessment
- dos attacks
- intrusion detection system
- network attacks
- security policies
- network management
- wired networks
- anomaly detection
- information security
- network monitoring
- risk assessment
- security breaches
- communication networks
- cloud computing
- internet traffic
- denial of service
- data processing
- real time
- network intrusion detection
- anti phishing
- wireless sensor
- data transfer
- peer to peer
- distributed systems
- information systems