Protocol scrubbing: network security through transparent flow modification.
David WatsonMatthew SmartG. Robert MalanFarnam JahanianPublished in: IEEE/ACM Trans. Netw. (2004)
Keyphrases
- network security
- end hosts
- packet filtering
- intrusion detection
- computer networks
- intrusion detection system
- dos attacks
- traffic analysis
- wired networks
- security policies
- network traffic
- anomaly detection
- denial of service attacks
- information security
- risk assessment
- security breaches
- tcp ip
- situation assessment
- lightweight
- anti phishing
- ip networks
- secure communication
- security protection
- network administrators
- real time
- denial of service
- object recognition
- data mining