Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program.
Amal SahaSugata SanyalPublished in: CoRR (2014)
Keyphrases
- machine learning algorithms
- intrusion detection
- application layer
- cyber security
- benchmark data sets
- intrusion detection system
- learning algorithm
- machine learning
- anomaly detection
- network traffic
- machine learning methods
- end to end
- decision trees
- network security
- network intrusion detection
- video streaming
- detecting anomalous
- alert correlation
- cyber attacks
- data mining
- machine learning models
- information security
- network intrusions
- ddos attacks
- computer networks
- unsupervised learning
- data mining techniques
- network attacks