Detection of Network Protection Security Vulnerability Intrusion Based on Data Mining.
Jinming ZhangPublished in: Int. J. Netw. Secur. (2019)
Keyphrases
- intrusion detection
- intrusion detection and prevention
- network attacks
- data mining
- information security
- intrusion detection system
- network security
- anomaly detection
- network traffic
- misuse detection
- cyber attacks
- network intrusion
- critical infrastructure
- cyber security
- computer networks
- intrusion prevention
- buffer overflow
- network intrusion detection
- security vulnerabilities
- risk assessment
- security architecture
- security risks
- denial of service
- denial of service attacks
- dos attacks
- malicious code detection
- security level
- security protection
- alert correlation
- computer security
- network structure
- data mining techniques
- security threats
- security issues
- security measures
- detection algorithm
- attack detection
- security requirements
- risk analysis
- association rules
- peer to peer
- knowledge discovery
- communication networks
- security policies
- homeland security
- data corruption
- protection mechanisms
- virtual private network
- fraud detection
- network management