Operational experiences with high-volume network intrusion detection.
Holger DregerAnja FeldmannVern PaxsonRobin SommerPublished in: CCS (2004)
Keyphrases
- high volume
- network intrusion detection
- intrusion detection
- anomaly detection
- network intrusion
- artificial immune
- fraud detection
- network anomaly detection
- real time
- intrusion detection system
- big data
- decision making
- case study
- network traffic
- databases
- machine learning
- network attacks
- call center
- computer networks
- electronic commerce
- data analysis