Unifying intrusion detection and forensic analysis via provenance awareness.
Yulai XieDan FengZhipeng TanJunzhe ZhouPublished in: Future Gener. Comput. Syst. (2016)
Keyphrases
- intrusion detection
- forensic analysis
- intrusion detection system
- flow analysis
- anomaly detection
- network traffic
- network security
- digital forensics
- traffic data
- high detection rate
- network intrusion detection
- metadata
- network intrusion
- information security
- artificial immune
- detecting anomalous
- data mining
- detection rate
- network attacks
- misuse detection
- network intrusions