An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection.
Anne DinningEdith SchonbergPublished in: PPOPP (1990)
Keyphrases
- anomaly detection
- intrusion detection
- one class support vector machines
- computer security
- detect anomalies
- network security
- anomalous behavior
- unsupervised anomaly detection
- network anomaly detection
- intrusion detection system
- network traffic
- learning algorithm
- network intrusion detection
- connectionist systems
- unsupervised learning
- data mining techniques
- active learning
- detecting anomalies
- behavior analysis
- cumulative sum
- training data