Robust consensus-based network intrusion detection in presence of Byzantine attacks.
Michel ToulouseHai LeCao Vien PhungDenis HockPublished in: SoICT (2016)
Keyphrases
- network intrusion detection
- network intrusion
- network anomaly detection
- network attacks
- network traffic data
- intrusion detection
- anomaly detection
- network intrusions
- fraud detection
- intrusion detection system
- network traffic
- artificial immune
- fault tolerant
- network security
- real world
- data sets
- data processing
- dimensionality reduction
- data warehouse