A Comparative Evaluation of Anomaly Detectors under Portscan Attacks.
Ayesha Binte AshfaqMaria Joseph RobertAsma MumtazMuhammad Qasim AliAli SajjadSyed Ali KhayamPublished in: RAID (2008)
Keyphrases
- comparative evaluation
- anomaly detection
- normal behavior
- countermeasures
- intrusion detection
- scoring methods
- object detection
- negative selection algorithm
- security threats
- page segmentation
- watermarking scheme
- security risks
- information retrieval systems
- malicious attacks
- security protocols
- network traffic
- denial of service attacks
- detecting anomalies
- machine learning