Using Attack Injection to Evaluate Intrusion Detection Effectiveness in Container-based Systems.
José FloraPaulo GonçalvesNuno AntunesPublished in: PRDC (2020)
Keyphrases
- intrusion detection
- network intrusion
- intrusion detection system
- anomaly detection
- intrusion prevention
- network intrusion detection systems
- network security
- network intrusion detection
- network traffic
- alert correlation
- cyber attacks
- network intrusions
- detecting anomalous
- cyber security
- computer security
- data mining
- data mining techniques
- computer systems
- high detection rate
- security vulnerabilities
- network attacks
- information security
- artificial immune
- machine learning
- object recognition
- normal behavior
- information systems
- data processing
- power system