Incorporating Feedback into Tree-based Anomaly Detection.
Shubhomoy DasWeng-Keen WongAlan FernThomas G. DietterichMd Amran SiddiquiPublished in: CoRR (2017)
Keyphrases
- anomaly detection
- intrusion detection
- anomalous behavior
- detecting anomalies
- computer security
- network traffic
- network anomaly detection
- unsupervised anomaly detection
- network intrusion detection
- behavior analysis
- intrusion detection system
- unsupervised learning
- one class support vector machines
- detecting anomalous
- detect anomalies
- malware detection
- network intrusion
- network security
- genetic algorithm
- real world