Evaluation of data mining techniques for suspicious network activity classification using honeypots data.
André GrégioRafael D. C. SantosAntonio MontesPublished in: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2007)
Keyphrases
- data mining techniques
- historical data
- data sets
- data collection
- association rule mining
- data mining
- network structure
- data mining methods
- knowledge discovery
- feature extraction
- high dimensional data
- classification accuracy
- data structure
- support vector machine
- data mining technology
- data mining applications
- data availability
- training data
- data mining algorithms
- forensic analysis
- data transfer
- network traffic
- information retrieval
- anomaly detection
- computer systems
- database
- text classification
- data sources
- feature vectors
- data analysis