Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider.
Selwyn RussellPublished in: Cryptography: Policy and Algorithms (1995)
Keyphrases
- traffic analysis
- network anomaly detection
- insider threat
- network traffic
- computer networks
- network model
- security threats
- network structure
- complex networks
- buffer overflow
- ddos attacks
- intrusion prevention
- peer to peer
- cyber attacks
- communication networks
- network intrusion
- network administrators
- network attacks
- network management
- countermeasures