Determining the operational limits of an anomaly-based intrusion detector.
Kymie M. C. TanRoy A. MaxionPublished in: IEEE J. Sel. Areas Commun. (2003)
Keyphrases
- intrusion detection
- anomaly detection
- negative selection algorithm
- intrusion detection system
- network security
- detection algorithm
- network traffic
- decision making
- network intrusion detection
- detecting anomalies
- anomalous behavior
- multiscale
- alert correlation
- artificial intelligence
- detection method
- database
- network intrusion
- data mining