Experimental analysis of application-level intrusion detection algorithms.
Yuhong DongSam HsuSaeed RajputBing WuPublished in: Int. J. Secur. Networks (2010)
Keyphrases
- data streams
- intrusion detection
- intrusion detection system
- application level
- network security
- anomaly detection
- network intrusion
- artificial immune
- network intrusion detection
- data sets
- high detection rate
- information security
- data mining techniques
- learning algorithm
- data mining
- network traffic
- operating system
- overlay network
- computational intelligence
- classification accuracy
- real time
- network attacks
- network intrusion detection systems