Clustering-based Approach for Anomaly Detection in XACML Policies.
Maryem Ait El HadjMeryeme AyacheYahya BenkaouzAhmed KhoumsiMohammed ErradiPublished in: SECRYPT (2017)
Keyphrases
- anomaly detection
- intrusion detection
- unsupervised learning
- detecting anomalies
- anomalous behavior
- clustering analysis
- network traffic
- role based access control
- network intrusion detection
- unsupervised anomaly detection
- detecting anomalous
- access control
- computer security
- intrusion detection system
- access control policies
- behavior analysis
- detect anomalies
- network security
- clustering method
- multi domain
- malware detection
- pattern recognition
- one class support vector machines
- network anomaly detection
- negative selection algorithm
- decision trees
- clustering algorithm
- cumulative sum
- misuse detection
- probabilistic model
- support vector machine
- self organizing maps
- security policies