Mining Host Behavior Patterns From Massive Network and Security Logs.
Jing YaTingwen LiuQuangang LiJinqiao ShiHaoliang ZhangPin LvLi GuoPublished in: ICCS (2017)
Keyphrases
- behavior patterns
- network monitoring
- security threats
- security measures
- behavioral patterns
- behavior analysis
- intrusion detection
- network management
- network traffic
- buffer overflow
- data analysis
- data mining
- web logs
- security issues
- log analysis
- customer behavior
- computer networks
- cyber attacks
- itemsets
- enterprise network
- machine learning
- object recognition
- knowledge discovery
- cyber security
- user interaction
- security requirements
- complex networks
- security policies
- communication networks