Visualizing the Malicious of Your Network Traffic by Explained Deep Learning.
Tsung-Yu HoWei-An ChenMing-Kung SunChiung-Ying HuangPublished in: ICAIIC (2020)
Keyphrases
- deep learning
- network traffic
- malicious code
- normal traffic
- malicious traffic
- intrusion detection
- anomaly detection
- unsupervised learning
- network security
- unsupervised feature learning
- machine learning
- intrusion detection system
- traffic data
- mental models
- weakly supervised
- traffic patterns
- internet traffic
- network intrusion detection
- non stationary
- data processing
- multi class
- hidden markov models
- pattern recognition
- information systems