On the Utility of Anonymized Flow Traces for Anomaly Detection
Martin BurkhartDaniela BrauckhoffMartin MayPublished in: CoRR (2008)
Keyphrases
- anomaly detection
- intrusion detection
- anonymized data
- detecting anomalies
- anomalous behavior
- network traffic
- network intrusion detection
- behavior analysis
- intrusion detection system
- network security
- one class support vector machines
- detecting anomalous
- sensitive information
- network anomaly detection
- unsupervised anomaly detection
- network intrusion
- malware detection
- negative selection algorithm
- privacy preserving
- computer vision
- privacy protection
- support vector machine
- connectionist systems