Protocol Analysis in Intrusion Detection Using Decision Tree.
Tarek AbbesAdel BouhoulaMichaël RusinowitchPublished in: ITCC (1) (2004)
Keyphrases
- intrusion detection
- anomaly detection
- intrusion detection system
- decision trees
- network intrusion detection
- information security
- network security
- intrusion prevention
- data sets
- false positives and false negatives
- data analysis
- network traffic
- lightweight
- training set
- computer security
- cyber security
- high detection rate
- artificial immune
- network intrusion detection systems
- machine learning