Wireless intrusion detection and response: a classic study using main-in-the-middle attack.
Timothy R. SchmoyerYu-Xi LimHenry L. OwenPublished in: WCNC (2004)
Keyphrases
- intrusion detection
- network intrusion detection
- network intrusion
- intrusion detection system
- anomaly detection
- network traffic
- network security
- alert correlation
- network intrusions
- network attacks
- high detection rate
- artificial immune
- normal behavior
- fraud detection
- detecting anomalous
- misuse detection
- false positives and false negatives
- network intrusion detection systems
- data sets