Eosinophils 发表于 2025-3-28 15:41:42

Using MIB II Variables for Network Intrusion Detection,mendous growth in network-based services. Intrusion detection is an important security technique for networks and systems. In this paper, we propose a methodology for utilizing MIB II objects for network intrusion detection. We establish the normal profiles of network activities based on the informa
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Applications of Data Mining in Computer Security; Daniel Barbará,Sushil Jajodia Book 2002 Springer Science+Business Media New York 2002 In