A Comparison of Different Machine Learning Algorithms for Intrusion Detection.
Basma KarbalRahal RomadiPublished in: ACOSIS (2019)
Keyphrases
- intrusion detection
- machine learning algorithms
- intrusion detection system
- benchmark data sets
- machine learning
- anomaly detection
- learning algorithm
- decision trees
- network intrusion detection
- machine learning methods
- network security
- network traffic
- artificial immune
- learning problems
- high detection rate
- computer security
- machine learning models
- data mining techniques
- alert correlation
- network intrusion
- cyber security
- detecting anomalous
- data mining
- machine learning approaches
- information security
- active learning
- network intrusions
- training data
- model selection
- data analysis
- object recognition
- network attacks
- databases