2006
DOI: 10.1093/ietisy/e89-d.1.189
|View full text |Cite
|
Sign up to set email alerts
|

Security Protocols Protection Based on Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…packets sent/received, number of TCP/UDP connection, number of HTTP/DNS request,etc. On the other side, protocol analysis consists in discovering protocol misuse at different levels [2](Data Link, Network, Transport, Application). The analysis is realized on sequences of protocol steps and protocol transaction evolutions.This section tends to cover the monitored data frequently used for the behavioral analysis.…”
Section: Behavioral Nids Indicatorsmentioning
confidence: 99%
“…packets sent/received, number of TCP/UDP connection, number of HTTP/DNS request,etc. On the other side, protocol analysis consists in discovering protocol misuse at different levels [2](Data Link, Network, Transport, Application). The analysis is realized on sequences of protocol steps and protocol transaction evolutions.This section tends to cover the monitored data frequently used for the behavioral analysis.…”
Section: Behavioral Nids Indicatorsmentioning
confidence: 99%