A game theoretic model for dynamic configuration of large-scale intrusion detection signatures.
Xaiver Jerald PunithanJong-Deok KimDongseok KimYoon-Ho ChoiPublished in: Multim. Tools Appl. (2016)
Keyphrases
- intrusion detection
- game theoretic
- anomaly detection
- probabilistic model
- data mining
- network security
- databases
- network traffic
- game theory
- data mining techniques
- knowledge discovery
- probability distribution
- special case
- intrusion detection system
- cooperative
- bayesian networks
- data sets
- computer security
- minority game
- detecting anomalous