Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum.
Jianhua YangYongzhong ZhangGuoqing ZhaoPublished in: AINA Workshops (2017)
Keyphrases
- intrusion detection
- intrusion detection system
- anomaly detection
- network security
- network traffic
- network intrusion detection
- artificial immune
- data mining
- information security
- high detection rate
- detecting anomalous
- network intrusion
- knowledge discovery
- false positives and false negatives
- network intrusion detection systems
- cyber security
- data sets
- network traffic data
- training set
- reinforcement learning
- intrusion prevention