Applications of HMM in Protocol Anomaly Detection.
Jing ZhaoHoukuan HuangShengfeng TianXiang ZhaoPublished in: CSO (2) (2009)
Keyphrases
- anomaly detection
- hidden markov models
- intrusion detection
- network intrusion detection
- anomalous behavior
- abnormal activity
- intrusion detection system
- computer security
- unsupervised anomaly detection
- detecting anomalies
- one class support vector machines
- network traffic
- pattern recognition
- behavior analysis
- detect anomalies
- data mining
- detecting anomalous
- conditional random fields
- network anomaly detection
- probabilistic model
- network security
- cumulative sum
- neural network