A deterministic approach for extracting network security intents.
Rafael Hengen RibeiroArthur Selle JacobsLuciano ZembruzkiRicardo ParizottoEder John ScheidAlberto Egon Schaeffer FilhoLisandro Zambenedetti GranvilleBurkhard StillerPublished in: Comput. Networks (2022)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- information security
- dos attacks
- risk assessment
- network traffic
- security policies
- situation assessment
- computer security
- network intrusion
- security protection
- anomaly detection
- security breaches
- network administrators
- ip networks
- end hosts
- anti phishing
- network monitoring
- information systems
- databases
- feature selection
- real world