Computer Science ›› 2009, Vol. 36 ›› Issue (4): 21-24.

Previous Articles     Next Articles

XIE Bai-lin, YU Shun-zheng, WANG Yu (Department of Electronics and Communication Engineering, Sun Yat-Sen University, Guangzhou 510275,China)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Most of the network anomaly detection approaches are based on packet header fields,while the payload is usually discarded, namely they detect network attacks only from network layer and transport layer. Unfortunately, most of today's attacks happen on the

Key words: Application level, Anomaly detection, Network security

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!