Evaluating Techniques for Practical Cloud-based Network Intrusion Detection.
Peter CocorosMatthew SobocinskiKyle SteigerJoel CoffmanPublished in: SmartCloud (2020)
Keyphrases
- network intrusion detection
- anomaly detection
- intrusion detection
- network intrusion
- network anomaly detection
- artificial immune
- fraud detection
- intrusion detection system
- network traffic
- cloud computing
- data sets
- data mining
- real world
- computer networks
- cost sensitive
- bayesian networks
- feature extraction
- network attacks