Combining Genetic-Based Misuse and Anomaly Detection for Reliably Detecting Intrusions in Computer Networks.
I. FinizioClaudio MazzarielloCarlo SansonePublished in: ICIAP (2005)
Keyphrases
- computer networks
- intrusion detection system
- anomaly detection
- misuse detection
- intrusion detection
- detecting anomalies
- network traffic
- network security
- detecting anomalous
- malicious activities
- network intrusion detection
- detect anomalies
- computer security
- high dimensional data streams
- anomalous behavior
- unsupervised anomaly detection
- genetic algorithm
- normal behavior
- network anomaly detection
- behavior analysis
- fraud detection
- streaming data
- computer systems
- maximum likelihood
- negative selection algorithm
- data analysis
- pattern recognition
- training data
- connectionist systems
- computer vision
- real world