Cyber intrusion detection through association rule mining on multi-source logs.
Ping LouGuantong LuXuemei JiangZheng XiaoJiwei HuJunwei YanPublished in: Appl. Intell. (2021)
Keyphrases
- association rule mining
- multi source
- intrusion detection
- cyber security
- data mining techniques
- data mining
- intrusion detection system
- association rules
- data fusion
- information fusion
- anomaly detection
- network security
- multiple sources
- data integration
- network traffic
- itemsets
- frequent itemsets
- knowledge discovery
- data sources
- information security
- data analysis
- database
- rough sets
- pattern mining
- data model
- interesting patterns
- social networks
- data sets