Network monitoring with constraint programming: Preliminary specification and analysis

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Network Monitoring and Intrusion Detection Systems plays an important role in today's computer networks health, allowing the diagnosis and detection of anomalous situations on the network that could damage the performance and put the security of users data in risk if not detected or diagnosed in time to take any necessary measures. In this paper we present a preliminary specification and analysis of a network monitoring and intrusion detection concept system based on constraint programming, implemented on several constraint solver systems. This concept allows to describe the desirable network situations through constraints on network entities, allowing a more expressive and clear way of describing network situations. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Salgueiro, P., & Abreu, S. (2011). Network monitoring with constraint programming: Preliminary specification and analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6547 LNAI, pp. 223–238). https://doi.org/10.1007/978-3-642-20589-7_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free