Real time distributed analysis of MPLS network logs for anomaly detection.
Muhammed MacitEmrullah DelibasBahtiyar KaranlikAlperen InalTevfik AytekinPublished in: NOMS (2016)
Keyphrases
- anomaly detection
- real time
- network traffic
- network anomaly detection
- intrusion detection
- behavior analysis
- peer to peer
- anomalous behavior
- network intrusion detection
- computer networks
- cumulative sum
- network intrusion
- data analysis
- detect anomalies
- network security
- intrusion detection system
- malware detection
- one class support vector machines
- network structure
- data mining