Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection.
Jidong LongDaniel G. SchwartzSara StoecklinMahesh K. PatelPublished in: ITCC (1) (2005)
Keyphrases
- anomaly detection
- behavior analysis
- intrusion detection
- connectionist systems
- learning algorithm
- unsupervised learning
- learning process
- network intrusion detection
- data sets
- intrusion detection system
- network traffic
- network security
- pattern recognition
- learning problems
- evolutionary algorithm
- probabilistic model
- genetic algorithm
- one class support vector machines
- network anomaly detection