AI/ML for Network Security: The Emperor has no Clothes.
Arthur Selle JacobsRoman BeltiukovWalter WillingerRonaldo A. FerreiraArpit GuptaLisandro Z. GranvillePublished in: CCS (2022)
Keyphrases
- network security
- intrusion detection
- computer networks
- maximum likelihood
- intrusion detection system
- network traffic
- traffic analysis
- security policies
- dos attacks
- information security
- computer security
- risk assessment
- security protection
- situation assessment
- anomaly detection
- ip networks
- network intrusion
- network administrators
- machine learning
- anti phishing
- security breaches
- end hosts
- denial of service
- network monitoring
- cyber security
- network attacks
- packet filtering
- network management
- training data