Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping
Mohammed A. AlhabeebAbdullah Mohammed AlmuhaidebPhu Dung LePublished in: CoRR (2010)
Keyphrases
- access control
- malicious users
- intrusion detection
- information security
- security requirements
- computer security
- security issues
- network layer
- insider attacks
- malicious activities
- malicious attacks
- security mechanisms
- security policies
- network security
- sensitive data
- network management
- statistical databases
- security protocols
- cyber security
- denial of service