Combining real-time risk visualization and anomaly detection.
Teemu VäisänenSami NoponenOuti-Marja LatvalaJarkko KuusijärviPublished in: ECSA (Companion) (2018)
Keyphrases
- anomaly detection
- intrusion detection
- anomalous behavior
- detecting anomalies
- network intrusion detection
- intrusion detection system
- network traffic
- network anomaly detection
- data assimilation
- data analysis
- computer security
- behavior analysis
- unsupervised anomaly detection
- negative selection algorithm
- network security
- neural network
- malware detection
- detect anomalies
- network intrusion
- one class support vector machines
- detecting anomalous
- connectionist systems
- unsupervised learning
- data processing
- evolutionary algorithm
- training data
- data sets
- feature selection
- cumulative sum
- risk factors