Keyphrases
- intrusion detection
- network traffic
- intrusion detection system
- network security
- network intrusion detection
- anomaly detection
- monitoring system
- artificial immune
- false positives and false negatives
- computer security
- detecting anomalous
- real world
- distributed intrusion detection
- network monitoring
- high detection rate
- network intrusions
- intrusion prevention
- computer networks
- information security
- cloud computing
- text classification
- association rules
- machine learning