Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems.
Jian GuanDa-xin LiuTong WangPublished in: ICCSA (3) (2004)
Keyphrases
- data mining methods
- intrusion detection system
- intrusion detection
- data mining techniques
- network security
- data mining
- anomaly detection
- network traffic
- computer networks
- network intrusion detection
- decision trees
- distributed intrusion detection
- attack detection
- computer security
- network intrusion detection systems
- data mining algorithms
- predictive modeling
- fuzzy numbers
- cyber security
- intrusion prevention
- alert correlation
- cyber attacks
- data processing
- misuse detection
- malicious activities
- fraud detection
- association rules
- association rule mining
- computer systems
- neural network
- visual analytics
- real world
- data structure
- security architecture
- knowledge discovery
- data warehouse
- text mining
- data sets