Identification Method of Attack Path Based on Immune Intrusion Detection.
Wenhua HuangYishuang GengPublished in: J. Networks (2014)
Keyphrases
- intrusion detection
- anomaly detection
- detection method
- artificial immune
- network security
- computational cost
- information retrieval
- training data
- credit card fraud detection
- network intrusions
- data sets
- network intrusion detection
- network traffic
- unsupervised learning
- data mining techniques
- classification accuracy
- probabilistic model
- data analysis
- information systems