Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS Security.
Casey T. DeccioAlden HiltonMichael BriggsTrevin AveryRobert RichardsonPublished in: Internet Measurement Conference (2020)
Keyphrases
- intrusion detection and prevention
- intrusion detection
- network security
- network traffic
- denial of service attacks
- intrusion prevention
- network intrusion
- security threats
- computer networks
- network management
- security issues
- intrusion detection system
- network administrators
- network structure
- network connection
- network intrusion detection
- enterprise network
- internet service providers
- network access
- security measures
- peer to peer
- application level
- queueing networks
- network services
- local area network
- information security
- dos attacks
- network configuration
- virtual private network
- statistical databases
- communication networks
- neural network
- security protection
- security policies
- cyber security
- ddos attacks
- network layer
- cyber attacks