Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.
Bo ZhouQi ShiMadjid MerabtiPublished in: ICCSA (4) (2006)
Keyphrases
- intrusion detection
- real time
- intrusion detection system
- anomaly detection
- network traffic
- computer networks
- network intrusion detection
- network security
- artificial immune
- high detection rate
- detecting anomalous
- computer security
- data mining techniques
- network intrusion
- data mining
- outlier mining
- false positives and false negatives
- alert correlation
- social networks
- network intrusions
- dos attacks
- cyber security
- fraud detection
- information security
- semi supervised
- feature selection