作者: Steven Richard Wright , Robert Barth Black
DOI:
关键词: Computer security 、 Signature (logic) 、 Network security 、 Networking hardware 、 Audit 、 Engineering 、 Router
摘要: A method and system for preventing, auditing trending unauthorized traffic in a network is provided. The detected at the router level. An attacker transmits an attack vector to system. signatures are created resources, wherein each signature represents response of resource vector. Signatures by learning how taking place within Network resources corresponding then emulated, thereby protecting device.