Keyphrases
- intrusion detection
- cloud computing
- anomaly detection
- intrusion detection system
- data center
- cloud computing platform
- network intrusion detection
- computing resources
- cloud computing environment
- high detection rate
- business models
- network security
- detecting anomalous
- big data
- outlier mining
- security issues
- data analysis
- network traffic
- web applications
- data sets
- cost effective
- computer security
- data processing
- data mining techniques
- alert correlation
- feature selection