A two-pass approach for minimising error in synthetically generated network traffic data sets.
Jacob SoperYue XuKien NguyenErnest FooZahra JadidiPublished in: ACSW (2023)
Keyphrases
- network traffic
- data sets
- intrusion detection
- anomaly detection
- intrusion detection system
- computer networks
- network bandwidth
- traffic data
- network security
- network monitoring
- traffic analysis
- network management
- network traffic data
- traffic volume
- internet traffic
- network resources
- training data
- detecting anomalous
- network intrusion detection
- long range dependence
- real world
- training set
- traffic patterns
- malicious code
- data streams
- information systems
- learning algorithm