Building intrusion pattern miner for Snort network intrusion detection system.
Lih-Chyau WuuChi-Hsiang HungSout-Fong ChenPublished in: J. Syst. Softw. (2007)
Keyphrases
- decision trees
- intrusion detection system
- intrusion detection
- network security
- network intrusion detection
- anomaly detection
- computer networks
- alert correlation
- network traffic
- data mining techniques
- machine learning
- pattern matching
- denial of service attacks
- network intrusion
- data mining
- information security
- computer systems
- multiscale
- database
- network attacks
- dos attacks
- pattern discovery
- e learning
- real time