Extending Machine Learning-Based Intrusion Detection with the Imputation Method.
Mikolaj KomisarekMarek PawlickiPiotr SobonskiAleksandra PawlickaRafal KozikMichal ChorasPublished in: CORES/IP&C/ACS (2021)
Keyphrases
- intrusion detection
- machine learning
- intrusion detection system
- missing data imputation
- anomaly detection
- data mining
- missing values
- network traffic
- network security
- data imputation
- network intrusion
- high detection rate
- missing data
- machine learning algorithms
- information security
- network intrusion detection
- detecting anomalous
- pattern recognition
- decision trees
- active learning
- artificial immune
- learning algorithm
- intrusion prevention
- data analysis
- knowledge discovery
- data mining techniques
- feature selection
- bayesian networks
- knn
- support vector machine
- imputation methods
- k nearest neighbor
- computer vision
- text mining
- supervised learning
- fraud detection
- text classification
- alert correlation
- network attacks
- database
- unsupervised learning