Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Yuval EloviciAsaf ShabtaiRobert MoskovitchGil TahanChanan GlezerPublished in: KI (2007)
Keyphrases
- network traffic
- malicious code
- anomaly detection
- intrusion detection
- normal traffic
- detecting anomalous
- network security
- computer networks
- machine learning
- network monitoring
- network intrusion detection
- static analysis
- traffic data
- network management
- network resources
- intrusion detection system
- network bandwidth
- traffic analysis
- artificial intelligence
- detect anomalies
- traffic patterns
- internet traffic
- reverse engineering
- network traffic data
- unsupervised learning
- high level
- long range dependence