Login / Signup
Technologies for Detecting Malicious Requests in Computer Networks Based on the DNS Protocol.
Olga Leshchenko
Oleksandr Trush
Mariya Trush
Andrii Horachuk
Oleksandr Makhovych
Published in:
IT&I Workshops (2023)
Keyphrases
</>
computer networks
end hosts
network security
detecting malicious
tcp ip
intrusion detection system
detect malicious
network traffic
traffic analysis
computer systems
network management
dos attacks
computer security
communication networks
databases
intrusion detection
data mining
load balancing
lightweight