Synthetic security policy generation via network traffic clustering.
Taghrid SamakEhab Al-ShaerPublished in: AISec (2010)
Keyphrases
- network traffic
- network security
- security policies
- network management
- anomaly detection
- intrusion detection
- computer networks
- intrusion detection system
- clustering algorithm
- access control
- security management
- k means
- network bandwidth
- detecting anomalous
- security requirements
- network resources
- network intrusion detection
- real world
- distributed systems
- network monitoring
- data points
- traffic data
- internet traffic
- traffic patterns
- network traffic data
- unsupervised learning
- ip networks
- high dimensional
- databases