Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users.
Youngja ParkIan M. MolloySuresh N. ChariZenglin XuChristopher S. GatesNinghui LiPublished in: ESORICS (2) (2015)
Keyphrases
- anomaly detection
- connectionist systems
- anomalous behavior
- intrusion detection
- user interface
- detecting anomalies
- unsupervised learning
- intrusion detection system
- normal behavior
- computer security
- user profiles
- network intrusion detection
- recommender systems
- reinforcement learning
- collaborative filtering
- detecting anomalous
- learning algorithm
- behavior analysis
- malware detection
- network anomaly detection
- neural network
- network traffic
- supervised learning