Black-Box Extraction of Functional Structures from System Call Traces for Intrusion Detection.
Xianghua ZhangJiwei LiZhaohui JiangHuanqing FengPublished in: ICIC (3) (2007)
Keyphrases
- black box
- intrusion detection
- intrusion detection system
- network security
- anomaly detection
- network traffic
- black boxes
- white box
- network intrusion detection
- cyber security
- detecting anomalous
- high detection rate
- information security
- network intrusion
- artificial immune
- data mining
- data mining techniques
- computer security
- machine learning
- integration testing
- object recognition
- alert correlation
- test cases
- unsupervised learning
- network intrusions