IDGraphs: Intrusion Detection and Analysis Using Stream Compositing.
Pin RenYan GaoZhichun LiYan ChenBenjamin WatsonPublished in: IEEE Computer Graphics and Applications (2006)
Keyphrases
- intrusion detection
- anomaly detection
- intrusion detection system
- outlier mining
- network intrusion detection
- data mining
- network security
- cyber security
- information security
- artificial immune
- high detection rate
- computer networks
- network traffic
- computer security
- model selection
- database systems
- feature selection
- network intrusion
- learning algorithm