Reliability theory application of bipolar network in monitoring and detecting network intrusion
Reliability theory application of bipolar network in monitoring and detecting network intrusion
Today the rapid and widespread development of computer networks and computer network environments brings many risks and threats to network security that cause loss or change data of information systems. Security attacks that change the state and components of the system will leave traces, so tracing for network security attacks is of interest. Depending on the monitoring environment and the protocols used to transmit information between network nodes, tracking of network security attacks is done