作者: Shlomo Kremer , Amichai Shulman , Mickey Boodaei
DOI:
关键词: Data mining 、 Computer network 、 Correlation 、 Networking hardware 、 Computer science 、 Computer program
摘要: A method for detecting network attacks is provided. In one implementation, the receives a plurality of attack indications based on data transmitted and applies rules to indications. Also, generates an alert if application at least subset indicates potential attack. addition, device that performs computer program corresponding are