Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
Samuel ChapmanRichard SmithLeandros A. MaglarasHelge JanickePublished in: J. Sens. Actuator Networks (2017)
Keyphrases
- network security
- network intrusion
- dos attacks
- network attacks
- traffic analysis
- computer networks
- network administrators
- network traffic
- situation assessment
- denial of service
- network access
- intrusion detection
- intrusion detection system
- end hosts
- security protection
- denial of service attacks
- packet filtering
- wireless sensor
- security policies
- security risks
- anomaly detection
- computer security
- network monitoring
- network intrusion detection
- information security
- cyber attacks
- security breaches
- risk assessment
- training set
- cyber security
- network management
- normal behavior
- real time
- peer to peer
- countermeasures
- data management
- dimensionality reduction
- supervised learning
- real world