System Anomaly Detection: Mining Firewall Logs.
Robert M. WindingTimothy E. WrightMichael J. ChapplePublished in: SecureComm (2006)
Keyphrases
- anomaly detection
- intrusion detection
- network traffic
- intrusion detection system
- network security
- detect anomalies
- detecting anomalies
- network intrusion detection
- anomalous behavior
- computer security
- data mining
- network anomaly detection
- behavior analysis
- sequential patterns
- unsupervised anomaly detection
- negative selection algorithm
- pattern mining
- detecting anomalous
- text mining
- network intrusion
- one class support vector machines
- itemsets
- data mining techniques
- data mining applications
- unsupervised learning
- active learning
- object recognition
- face recognition
- neural network
- information security
- frequent patterns