Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring.
Florian WilkensSteffen HaasJohanna AmannMathias FischerPublished in: SEC (2022)
Keyphrases
- network security
- situation assessment
- secure communication
- intrusion detection
- network monitoring
- computer networks
- intrusion detection system
- monitoring system
- wireless sensor
- information security
- traffic analysis
- dos attacks
- network traffic
- security policies
- anomaly detection
- security breaches
- real time
- risk assessment
- ip networks
- security protection
- network administrators
- real world
- denial of service
- network intrusion
- knowledge discovery
- business intelligence
- computer systems
- database systems
- machine learning
- anti phishing