Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning.
Xibin SunDu ZhangHaiou QinJiahua TangPublished in: Secur. Commun. Networks (2022)
Keyphrases
- network security
- machine learning
- intrusion detection
- anomaly detection
- intrusion detection system
- computer networks
- network attacks
- network traffic
- traffic analysis
- network intrusion
- normal behavior
- security breaches
- security policies
- risk assessment
- computer security
- dos attacks
- network administrators
- ip networks
- network intrusion detection
- information security
- denial of service
- wired networks
- machine learning or data mining
- security protection
- learning algorithm
- misuse detection
- active learning
- data mining techniques
- data mining
- data analysis
- data streams
- pattern recognition
- end hosts
- packet filtering
- network monitoring