A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques.
Thomas StiborJonathan TimmisClaudia EckertPublished in: ICARIS (2005)
Keyphrases
- negative selection
- anomaly detection
- real valued
- intrusion detection
- artificial immune
- network intrusion detection
- network traffic
- intrusion detection system
- latent variables
- detect anomalies
- unsupervised learning
- decision trees
- ranking functions
- clonal selection
- artificial immune system
- neural network
- genetic algorithm