Intrusion Detection Using Third-Parties Support.
Masakazu FujiiKenichi TakahashiYoshiaki HoriKouichi SakuraiPublished in: FTDCS (2008)
Keyphrases
- intrusion detection
- third party
- anomaly detection
- intrusion detection system
- network intrusion detection
- network security
- network traffic
- detecting anomalous
- data mining
- network intrusion
- high detection rate
- cyber security
- intrusion prevention
- artificial immune
- computer security
- information security
- databases
- sensitive information
- information systems
- alert correlation
- network attacks
- personal information
- data mining techniques
- supervised learning
- end users
- web apis
- information retrieval
- network intrusions
- data sets