Application of Bagging, Boosting and Stacking to Intrusion Detection.
Iwan SyarifEd ZaluskaAdam Prügel-BennettGary B. WillsPublished in: MLDM (2012)
Keyphrases
- intrusion detection
- ensemble learning
- intrusion detection system
- network security
- anomaly detection
- network traffic
- network intrusion detection
- computer security
- detecting anomalous
- base classifiers
- high detection rate
- information security
- ensemble methods
- machine learning
- artificial immune
- false positives and false negatives
- databases
- data mining
- multi class
- reinforcement learning
- active learning
- alert correlation
- decision trees
- information systems
- network intrusions