Shield: vulnerability-driven network filters for preventing known vulnerability exploits.
Helen J. WangChuanxiong GuoDaniel R. SimonAlf ZugenmaierPublished in: SIGCOMM (2004)
Keyphrases
- buffer overflow
- attack graphs
- data driven
- attack graph
- network design
- complex networks
- wireless sensor networks
- network structure
- peer to peer
- computer networks
- network management
- information security
- link prediction
- gabor filters
- network model
- network architecture
- risk assessment
- network resources
- network configuration
- response time
- penetration testing
- real time