Description of bad-signatures for network intrusion detection.
Michael HilkerChristoph SchommerPublished in: ACSW (2006)
Keyphrases
- network intrusion detection
- intrusion detection
- anomaly detection
- network intrusion
- intrusion detection system
- artificial immune
- fraud detection
- network traffic
- network traffic data
- network anomaly detection
- real world
- network security
- bayesian networks
- data mining
- databases
- network intrusions
- pattern recognition
- signature verification
- database systems