LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory.
Neema DavisGaurav RainaKrishna P. JagannathanPublished in: EPIA (1) (2019)
Keyphrases
- anomaly detection
- extreme value theory
- intrusion detection
- anomalous behavior
- detecting anomalies
- network intrusion detection
- detecting anomalous
- detect anomalies
- network traffic
- behavior analysis
- computer security
- unsupervised anomaly detection
- intrusion detection system
- malware detection
- normal behavior
- network anomaly detection
- neural network
- network security
- one class support vector machines
- unsupervised learning
- association rules
- cumulative sum
- computer vision
- pattern mining
- network intrusion