Bypassing system calls-based intrusion detection systems.
Ishai RosenbergEhud GudesPublished in: Concurr. Comput. Pract. Exp. (2017)
Keyphrases
- intrusion detection system
- intrusion detection
- network security
- anomaly detection
- network traffic
- computer networks
- network intrusion detection
- computer security
- distributed intrusion detection
- alert correlation
- cyber security
- computer systems
- intrusion prevention
- attack detection
- network intrusions
- denial of service attacks
- malicious activities
- multistage
- real world
- network intrusion detection systems
- database
- cyber attacks
- network attacks
- misuse detection
- control system
- data processing