KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection.
Maheshkumar SabhnaniGürsel SerpenPublished in: Security and Management (2003)
Keyphrases
- feature set
- heuristic rules
- attack detection
- multistage
- feature reduction
- data mining
- intrusion detection system
- feature selection
- random forest
- knowledge discovery
- feature vectors
- classification accuracy
- feature extraction
- wordnet
- product recommendation
- texture features
- data analysis
- feature space
- feature subset
- data mining techniques
- data sets
- cyber attacks
- artificial intelligence
- intrusion detection
- search engine
- text mining
- information retrieval
- dynamic programming
- pattern recognition
- machine learning
- image processing