Differential threat detection processing

作者: Jeremy Bennett

DOI:

关键词: Heuristic (computer science)Computer networkDifferential (mechanical device)Computer scienceNetwork securityData mining

摘要: Detecting a network security threat is disclosed. Network traffic classified with risk related classification, the classification being determined at least in part by applying detection heuristic to portion of traffic. Classification data that indicates into which has been added The subjected level processing corresponds as based on data.

参考文章(15)
Curtis Schwaderer, David Lyons, Rick Stoen, Routing and forwarding table management for network processor architectures ,(2002)
Yoram Ofek, Mario Baldi, Marcel Mordechay Yung, Trusted communications system ,(2002)
David James Fladebo, Robert James Demopoulos, Integrated data traffic monitoring system ,(2005)
Marinus Frans Kaashoek, Massimiliano Antonio Poletto, Edward W. Kohler, Architecture to thwart denial of service attacks ,(2002)
John A. Copeland, Network port profiling ,(2002)
Jon Ramsey, Steve Buer, Kevin Ketts, Integrated Computer Security Management System and Method ,(2012)
John Reed Harrison, David Allen Conklin, Network surveillance system ,(1996)