作者: Rephael Tzadikario
DOI:
关键词:
摘要: A computer-implemented method for mitigating attacks of malicious traffic in a computer network [figure 1 , unit 20 includes receiving set attack sequences, including first sequences suspected containing the traffic, analyzing so as to automatically extract regular expression that matches at least portion set, and comparing second order identify contain traffic.