Considering Both Intra-Pattern and Inter-Pattern Anomalies for Intrusion Detection.
Ning JiangKien A. HuaSimon SheuPublished in: ICDM (2002)
Keyphrases
- intrusion detection
- anomaly detection
- intrusion detection system
- network traffic
- network intrusion
- network security
- network intrusion detection
- data mining
- network attacks
- computer security
- artificial immune
- data mining techniques
- detecting anomalous
- unsupervised anomaly detection
- false positives and false negatives
- cyber security
- information security
- object recognition
- computer vision