Success, Failure, and Alternative Solutions for Network Security.
Peiter ZatkoPublished in: USENIX Annual Technical Conference, General Track (2006)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- dos attacks
- security policies
- risk assessment
- ip networks
- information security
- network traffic
- computer security
- anomaly detection
- network intrusion
- situation assessment
- security breaches
- security protection
- anti phishing
- denial of service
- data fusion
- end hosts
- model selection
- knowledge discovery