Machine Learning Techniques for Classifying Network Anomalies and Intrusions.
Zhida LiAna Laura Gonzalez RiosGuangyu XuLjiljana TrajkovicPublished in: ISCAS (2019)
Keyphrases
- anomaly detection
- network attacks
- network traffic
- intrusion detection
- network intrusion
- network intrusion detection
- detecting anomalies
- wireless sensor networks
- machine learning methods
- normal behavior
- computer networks
- communication networks
- peer to peer
- detect anomalies
- anomalous behavior
- network model
- abnormal behavior
- network security
- machine learning approaches
- network architecture
- communication cost
- database
- complex networks
- machine learning algorithms
- case study
- information systems