Scalable Techniques for Anomaly Detection
Computer networks are constantly being attacked by malicious entities for various reasons. Network based attacks include but are not limited to, Distributed Denial of Service (DDoS), DNS based attacks, Cross-site Scripting (XSS) etc. Such attacks have exploited either the network protocol or the end...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/1969.1/148330 |