Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic.
Abdun Naser MahmoodJiankun HuZahir TariChristopher LeckiePublished in: J. Netw. Comput. Appl. (2010)
Keyphrases
- network traffic
- frequent patterns
- anomaly detection
- frequent pattern mining
- detecting anomalous
- intrusion detection
- normal traffic
- pattern mining
- association rules
- mining algorithm
- mining frequent patterns
- search space pruning
- sequential patterns
- intrusion detection system
- traffic data
- uncertain data
- interesting patterns
- network intrusion detection
- tree structure
- sequential pattern mining
- itemsets
- frequent itemsets
- machine learning
- mining frequent
- mining frequent itemsets
- frequent pattern mining algorithms
- database