Keyphrases
Engineering Approach
100%
List-based
100%
Packet Filter
100%
Network Intrusion Detection
100%
Signature-based
100%
Spoofing Attack
50%
Network Intrusion Detection System
50%
IP Spoofing
50%
Engineering Method
25%
Low Dose Rate
25%
Promising Solutions
25%
Load Reduction
25%
Matching Process
25%
False Alarm
25%
Intrusion Detection System
25%
Verification Mechanism
25%
Real Network Environment
25%
Signature Matching
25%
Blacklist
25%
Security Infrastructure
25%
Unwanted Traffic
25%
Packet Filtration
25%
Filtration Reduction
25%
Whitelist
25%
IP Verification
25%
Simulated Network
25%
Computer Science
Spoofing Attack
100%
network intrusion detection
100%
Biggest Challenge
50%
Network Intrusion Detection System
50%
Intrusion Detection System
50%
Security Infrastructure
50%
Network Based Intrusion Detection System
50%
Network Environment
50%
Experimental Result
50%
Matching Process
50%