Apply Data Mining to Defense-in-Depth Network Security System.
Nen-Fu HuangChia-Nan KaoHsien-Wei HungGin-Yuan JaiChia-Lin LinPublished in: AINA (2005)
Keyphrases
- network security
- intrusion detection
- data mining
- intrusion detection system
- computer networks
- network traffic
- traffic analysis
- computer security
- security policies
- dos attacks
- anomaly detection
- network intrusion
- network intrusion detection
- real world
- information security
- association rules
- risk assessment
- ip networks
- situation assessment
- data mining techniques
- fraud detection
- network administrators
- machine learning
- dimensionality reduction
- security protection
- cyber security
- knowledge discovery
- network monitoring
- anti phishing
- packet filtering
- learning algorithm
- smart grid
- decision support
- text mining
- decision making