The challenge of detecting sophisticated attacks: Insights from SOC Analysts.
Olusola AkinrolabuIoannis AgrafiotisArnau ErolaPublished in: ARES (2018)
Keyphrases
- network intrusion detection systems
- countermeasures
- malicious activities
- detecting malicious
- intrusion detection system
- low power
- traffic analysis
- data analysis
- intrusion detection
- watermarking scheme
- real world
- security protocols
- detect malicious
- misuse detection
- malicious attacks
- security risks
- signal processing
- data mining