An Authorized Access Attack Detection Method for Realtime Intrusion Detection System.
Sung-Kwan YoumYong-Kab KimKwang-Seong ShinEui-Jik KimPublished in: CCNC (2020)
Keyphrases
- detection method
- intrusion detection system
- attack detection
- intrusion detection
- alert correlation
- attack scenarios
- misuse detection
- denial of service attacks
- network security
- network intrusions
- network attacks
- normal behavior
- cyber attacks
- anomaly detection
- unauthorized access
- detection algorithm
- computer networks
- malicious activities
- network intrusion detection
- normal traffic
- distributed intrusion detection
- face detection
- network traffic
- network intrusion
- security measures
- access control
- cyber security
- computer systems
- dos attacks
- multistage
- attack graph
- countermeasures
- model selection
- knowledge discovery