Anomalous Payload-Based Network Intrusion Detection.
Ke WangSalvatore J. StolfoPublished in: RAID (2004)
Keyphrases
- network intrusion detection
- anomaly detection
- network traffic
- intrusion detection
- network intrusion
- intrusion detection system
- network anomaly detection
- artificial immune
- network security
- computer networks
- network traffic data
- databases
- real world
- network attacks
- network monitoring
- metadata
- learning process
- bayesian networks
- information systems
- network intrusions