Keyphrases
- alert correlation
- data reduction
- intrusion detection
- intrusion detection system
- data compression
- data mining
- attack graph
- preprocessing
- classification rules
- knowledge discovery
- attack scenarios
- data analysis
- classification accuracy
- anomaly detection
- network security
- dimensionality reduction
- model selection
- singular value decomposition
- feature selection
- data mining techniques
- rough set theory
- high dimensionality
- clustering algorithm
- machine learning
- nearest neighbor
- decision trees
- real world