Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks.
Hongyue KangBo LiuJelena V. MisicVojislav B. MisicXiaolin ChangPublished in: ICNC (2020)
Keyphrases
- security threats
- security measures
- cyber attacks
- denial of service attacks
- buffer overflow
- intrusion prevention
- traffic analysis
- security risks
- countermeasures
- fault injection
- network security
- intrusion detection
- security issues
- security mechanisms
- security problems
- intrusion detection and prevention
- network attacks
- network administrators
- java card
- security protocols
- computer security
- information security
- security breaches
- intrusion detection system
- computer networks
- peer to peer
- malicious traffic
- network management
- security vulnerabilities
- network traffic
- security management
- cyber security
- security policies
- wireless sensor networks
- ddos attacks
- forensic analysis
- stream cipher
- dos attacks
- access control
- malicious attacks
- denial of service
- malicious nodes
- malicious users
- security requirements
- key management
- network structure
- complex systems
- virtual private network