Suspicious-Taint-Based Access Control for Protecting OS from Network Attacks.
Zhiyong ShanPublished in: CoRR (2016)
Keyphrases
- network attacks
- intrusion detection
- anomaly detection
- network security
- security policies
- network traffic
- network intrusion detection
- windows xp
- intrusion detection system
- operating system
- network intrusions
- dos attacks
- computer networks
- open source
- control flow
- computer systems
- access control
- virtual machine
- fraud detection
- decision trees
- lightweight
- data processing
- information security
- sensor networks
- data streams
- social networks
- machine learning