A Game-Theoretic Approach for Network Security Using Honeypots.
Razvan FloreaMitica CrausPublished in: Future Internet (2022)
Keyphrases
- network security
- network intrusion
- intrusion detection system
- intrusion detection
- computer networks
- network traffic
- anomaly detection
- traffic analysis
- computer security
- security breaches
- information security
- security policies
- dos attacks
- risk assessment
- security protection
- situation assessment
- network intrusion detection
- network administrators
- packet filtering
- ip networks
- network management
- database systems
- electronic commerce
- computer systems
- data warehouse
- information technology