A Two-Stage Process Based on Data Mining and Optimization to Identify False Positives and False Negatives Generated by Intrusion Detection Systems.
Fatma HachmiMohamed LimamPublished in: CIS (2015)
Keyphrases
- intrusion detection
- false positives and false negatives
- intrusion detection system
- data mining
- network security
- anomaly detection
- network traffic
- network intrusion detection
- data mining techniques
- malicious code detection
- computer security
- computer networks
- intrusion prevention
- previously unknown
- information security
- network intrusion
- fraud detection
- cyber security
- network intrusions
- misuse detection
- network intrusion detection systems
- distributed intrusion detection
- alert correlation
- cyber attacks
- machine learning
- network attacks
- normal behavior
- data analysis