A review on graph-based approaches for network security monitoring and botnet detection.
Sofiane LagraaMartin HusákHamida SebaSatyanarayana VuppalaRadu StateMoussa OuedraogoPublished in: Int. J. Inf. Sec. (2024)
Keyphrases
- network security
- network traffic
- intrusion detection
- situation assessment
- computer networks
- anomaly detection
- traffic analysis
- intrusion detection system
- network attacks
- security protection
- monitoring system
- risk assessment
- ip networks
- computer security
- network monitoring
- network intrusion detection
- real time
- information security
- model selection
- dos attacks
- semi supervised
- database systems
- data mining