Login / Signup
Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls.
Guiling Zhang
Published in:
ICCNMC (2005)
Keyphrases
</>
intrusion detection
fuzzy association rules
association rules mining
intrusion detection system
anomaly detection
association rules
mining algorithm
network security
fuzzy sets
network intrusion detection
rule mining
network traffic
sequential patterns
detecting anomalous
data mining techniques
membership functions
data mining
interestingness measures
information security
fraud detection
intrusion prevention
pattern recognition
apriori algorithm
mining association rules
data mining tools
pattern mining
attribute values
association rule mining
network attacks
high dimensional