Spoofing Attack Detection by Anomaly Detection.
Soroush FatemifarShervin Rahimzadeh ArashlooMuhammad AwaisJosef KittlerPublished in: ICASSP (2019)
Keyphrases
- attack detection
- anomaly detection
- intrusion detection system
- intrusion detection
- multistage
- network traffic
- network security
- network intrusion detection
- computer networks
- anomalous behavior
- detecting anomalies
- network anomaly detection
- misuse detection
- cyber security
- cyber attacks
- alert correlation
- information systems
- information security
- detect anomalies
- feature vectors
- decision trees
- one class support vector machines
- negative selection algorithm
- real world