Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II.
Kathia Regina L. JucáAzzedine BoukercheJoão Bosco M. SobralMirela Sechi Moretti Annoni NotarePublished in: IPDPS (2003)
Keyphrases
- computer systems
- anomaly detection
- human beings
- intrusion detection system
- operating system
- data processing
- computer security
- hardware and software
- intrusion detection
- computing systems
- detecting anomalies
- network traffic
- normal behavior
- computer architecture
- detect anomalies
- communication systems
- information systems
- detection rate
- object detection
- automatic detection
- human subjects
- false positives
- detection algorithm
- network intrusion detection
- computer technology
- misuse detection
- network security
- detection method
- high end
- computer hardware
- information processing systems
- artificial immune
- genetic algorithm
- metadata
- virus detection