Data Mining Methods for Anomaly Detection of HTTP Request Exploitations.
Xiao-Feng WangJing-Li ZhouSheng-Sheng YuLong-Zheng CaiPublished in: FSKD (2) (2005)
Keyphrases
- data mining methods
- anomaly detection
- data mining
- decision trees
- detecting anomalies
- intrusion detection
- network traffic
- data mining applications
- data mining techniques
- network intrusion detection
- anomalous behavior
- data mining algorithms
- intrusion detection system
- detecting anomalous
- network anomaly detection
- unsupervised anomaly detection
- one class support vector machines
- behavior analysis
- detect anomalies
- network security
- negative selection algorithm
- real world
- connectionist systems
- streaming data
- machine learning
- network intrusion
- metadata
- nearest neighbor
- unsupervised learning