Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks.
Harsha K. KalutarageSiraj Ahmed ShaikhIndika P. WickramasingheQin ZhouAnne E. JamesPublished in: Comput. Electr. Eng. (2015)
Keyphrases
- computer networks
- malicious activities
- intrusion detection system
- network traffic
- intrusion detection
- security problems
- network security
- network monitoring
- network management
- anomaly detection
- detecting malicious
- communication networks
- detect malicious
- real time
- monitoring system
- network intrusion detection systems
- computer systems
- real world
- countermeasures
- identity theft
- reinforcement learning