Applying Data Mining Techniques to Intrusion Detection.
Jonathon NgDeepti JoshiShankar M. BanikPublished in: ITNG (2015)
Keyphrases
- intrusion detection
- anomaly detection
- intrusion detection system
- network traffic
- network intrusion detection
- network security
- information security
- network intrusion
- cyber security
- high detection rate
- artificial immune
- alert correlation
- data mining techniques
- computer security
- detecting anomalous
- false positives and false negatives
- databases
- network intrusions
- security vulnerabilities
- model selection
- dimensionality reduction
- face recognition
- machine learning