LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory.
Neema DavisGaurav RainaKrishna P. JagannathanPublished in: CoRR (2019)
Keyphrases
- anomaly detection
- extreme value theory
- intrusion detection
- detecting anomalous
- network anomaly detection
- network intrusion detection
- network traffic
- detecting anomalies
- unsupervised anomaly detection
- intrusion detection system
- detect anomalies
- behavior analysis
- anomalous behavior
- malware detection
- computer security
- negative selection algorithm
- network security
- network intrusion
- normal behavior
- recurrent neural networks
- one class support vector machines
- unsupervised learning
- misuse detection
- neural network
- support vector machine
- hidden markov models
- association rules
- data analysis