An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection.
Ulrich Ultes-NitscheInSeon YooPublished in: ISSA (2002)
Keyphrases
- network security
- anomaly detection
- end hosts
- detecting malicious
- intrusion detection
- intrusion detection system
- network traffic
- computer security
- network intrusion
- traffic analysis
- normal behavior
- computer networks
- network intrusion detection
- dos attacks
- ip networks
- data mining techniques
- anti virus
- information retrieval
- information security
- databases
- malware detection
- lightweight
- unsupervised learning
- real world