Learning to Customize Network Security Rules.
Michael BarguryRoy LevinRoyi RonenPublished in: CoRR (2017)
Keyphrases
- network security
- learning algorithm
- intrusion detection
- risk assessment
- learning process
- machine learning
- reinforcement learning
- traffic analysis
- databases
- dos attacks
- security policies
- computer networks
- network traffic
- intrusion detection system
- anomaly detection
- semi supervised
- object recognition
- learning environment
- information systems