Optimal thresholds for intrusion detection systems.
Aron LaszkaWaseem AbbasS. Shankar SastryYevgeniy VorobeychikXenofon D. KoutsoukosPublished in: HotSoS (2016)
Keyphrases
- training data
- intrusion detection system
- intrusion detection
- network security
- computer networks
- anomaly detection
- network intrusion detection
- network traffic
- computer security
- intrusion prevention
- distributed intrusion detection
- attack detection
- denial of service attacks
- dynamic programming
- computer systems
- data mining
- security architecture
- data processing
- security policies
- cyber attacks
- normal behavior
- dimensionality reduction
- attack scenarios
- data mining techniques