Isolation Mondrian Forest for Batch and Online Anomaly Detection.
Haoran MaBenyamin GhojoghMaria N. SamadDongyu ZhengMark CrowleyPublished in: CoRR (2020)
Keyphrases
- anomaly detection
- intrusion detection
- detecting anomalies
- network traffic
- anomalous behavior
- behavior analysis
- unsupervised anomaly detection
- intrusion detection system
- network intrusion detection
- computer security
- network anomaly detection
- one class support vector machines
- detect anomalies
- network security
- data assimilation
- data sets
- malware detection
- evolutionary algorithm
- detecting anomalous
- association rules