Reinforcing network security by converting massive data flow to continuous connections for IDS.
Maher SalemUlrich BuehlerPublished in: ICITST (2013)
Keyphrases
- network security
- massive data
- intrusion detection system
- intrusion detection
- data mining applications
- computer networks
- anomaly detection
- traffic analysis
- network traffic
- network intrusion detection
- massive datasets
- network intrusion
- information security
- risk assessment
- data mining techniques
- dos attacks
- computer systems
- big data
- network administrators
- situation assessment
- security breaches
- security protection
- decision support system
- knowledge discovery
- denial of service
- distance function
- network attacks
- machine learning