Intrusion detection in IT networks with limited observations.
Praveen BommannavarNicholas BambosPublished in: ICNC (2012)
Keyphrases
- network structure
- intrusion detection
- intrusion detection system
- anomaly detection
- social networks
- communication networks
- network security
- network intrusion detection
- network traffic
- artificial immune
- high detection rate
- information security
- detecting anomalous
- false positives and false negatives
- network intrusion
- credit card fraud detection
- computer security
- data mining
- computer networks
- cyber security
- network traffic data
- databases
- object recognition
- fraud detection
- face detection
- data mining techniques
- data analysis
- alert correlation
- database systems
- learning algorithm
- real world
- data sets
- intrusion prevention