Weighting versus pruning in rule validation for detecting network and host anomalies.
Gaurav TandonPhilip K. ChanPublished in: KDD (2007)
Keyphrases
- anomaly detection
- network traffic
- detecting anomalies
- network model
- communication networks
- network intrusion
- detect anomalies
- traffic analysis
- active databases
- computer networks
- network structure
- bayesian networks
- neural network
- automatic detection
- network architecture
- network management
- pruning strategy
- search space
- data mining