Modelling and solving the intrusion detection problem in computer networks.
Rachid BeghdadPublished in: Comput. Secur. (2004)
Keyphrases
- computer networks
- intrusion detection
- intrusion detection system
- network traffic
- network security
- anomaly detection
- network intrusion detection
- network management
- communication networks
- network intrusion
- high detection rate
- data mining
- cyber security
- distributed intrusion detection
- alert correlation
- computer security
- network monitoring
- network intrusions
- information security
- artificial immune
- network attacks
- data mining techniques
- normal behavior
- computer systems
- image segmentation
- data sets
- network intrusion detection systems
- computer network security