The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.
Eric Chan-TinDaniel FeldmanNicholas HopperYongdae KimPublished in: SecureComm (2009)
Keyphrases
- anomaly detection
- network anomaly detection
- network intrusion
- coordinate systems
- network traffic
- normal behavior
- intrusion detection
- network intrusion detection
- normal traffic
- detect anomalies
- intrusion detection system
- anomalous behavior
- detecting anomalies
- computer networks
- unsupervised learning
- one class support vector machines
- network security
- intrusion prevention
- misuse detection
- negative selection algorithm
- abnormal events
- attack graph
- network configuration
- machine learning
- computer systems