Unknown Attacks Detection Using Feature Extraction from Anomaly-Based IDS Alerts.
Masaaki SatoHirofumi YamakiHiroki TakakuraPublished in: SAINT (2012)
Keyphrases
- intrusion detection system
- intrusion detection
- normal behavior
- anomaly detection
- network attacks
- network intrusion detection systems
- attack detection
- misuse detection
- feature extraction
- normal traffic
- network security
- network traffic
- attack scenarios
- network intrusions
- computer security
- network intrusion
- network intrusion detection
- alert correlation
- denial of service attacks
- intrusion prevention
- face recognition
- cyber attacks
- detect anomalies
- feature vectors
- false alarms
- pattern classification
- false positives
- computer systems
- preprocessing
- feature selection
- abnormal behavior
- feature extraction and classification
- automatic detection
- data mining techniques
- linear feature extraction
- data mining