Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection.
Peng LiHyundo ParkDebin GaoJianming FuPublished in: ACSAC (2008)
Keyphrases
- anomaly detection
- data flow
- flow analysis
- intrusion detection
- database machine
- control flow
- anomalous behavior
- detecting anomalies
- network traffic
- information flow
- network intrusion detection
- behavior analysis
- unsupervised anomaly detection
- object oriented software
- network security
- network anomaly detection
- intrusion detection system
- detect anomalies
- object oriented
- detecting anomalous
- systolic array
- one class support vector machines
- negative selection algorithm
- connectionist systems
- social networks
- dimensionality reduction
- principal component analysis
- relational databases
- pattern recognition
- image processing