Using Artificial Anomalies to Detect Unknown and Known Network Intrusions.
Wei FanMatthew MillerSalvatore J. StolfoWenke LeePhilip K. ChanPublished in: ICDM (2001)
Keyphrases
- network attacks
- network intrusions
- intrusion detection
- network intrusion detection
- intrusion detection system
- network security
- anomaly detection
- dos attacks
- network traffic
- normal behavior
- detect anomalies
- learning algorithm
- unsupervised learning
- data analysis
- detection method
- real world
- reinforcement learning
- detecting anomalies
- data mining