Anomaly detection based on system text logs of virtual network functions.
Daniela N. RimDongNyeong HeoChungjun LeeSukhyun NamJae-Hyoung YooJames Won-Ki HongHeeyoul ChoiPublished in: Big Data Res. (2024)
Keyphrases
- anomaly detection
- network traffic
- network anomaly detection
- detect anomalies
- intrusion detection
- network intrusion
- detecting anomalies
- network intrusion detection
- intrusion detection system
- detecting anomalous
- intrusion prevention
- anomalous behavior
- behavior analysis
- normal behavior
- unsupervised anomaly detection
- cumulative sum
- network security
- unsupervised learning
- text mining
- negative selection algorithm
- computer networks
- computer security
- one class support vector machines
- self organizing maps
- connectionist systems
- network configuration
- malware detection
- information retrieval
- data points
- hidden markov models
- object recognition
- decision trees