作者: Andrew Zawadowskiy , Jeffrey A. Kraemer
DOI:
关键词:
摘要: A system receives information from at least one security interceptor associated with computer system. The identifies details a traffic flow in of the networking environment. determines probability that an attack on is progress based probabilistic link provided by information. determined previous attacks. Based interceptor, generates signature utilized to prevent similar