An Environment for Security Protocol Intrusion Detection.
Alec YasinsacPublished in: J. Comput. Secur. (2002)
Keyphrases
- intrusion detection
- security protocols
- intrusion detection system
- anomaly detection
- network security
- network traffic
- network intrusion detection
- high detection rate
- computer security
- information security
- cyber security
- network intrusion
- network attacks
- low cost
- machine learning
- detecting anomalous
- alert correlation
- computer networks
- fraud detection
- real time
- e government
- database systems
- information systems
- data mining