The use of computational intelligence in intrusion detection systems: A review.
Shelly Xiaonan WuWolfgang BanzhafPublished in: Appl. Soft Comput. (2010)
Keyphrases
- intrusion detection system
- computational intelligence
- intrusion detection
- network security
- anomaly detection
- computer networks
- network intrusion detection
- network traffic
- computer security
- computer systems
- attack detection
- distributed intrusion detection
- intrusion prevention
- alert correlation
- fuzzy logic
- network intrusion detection systems
- machine learning
- denial of service attacks
- artificial neural networks
- neural network
- attack scenarios
- information systems
- cyber security
- cyber attacks
- network intrusion
- network attacks
- misuse detection
- false positive rate
- normal behavior
- data mining techniques
- dimensionality reduction
- data mining