Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS).
H. S. HotaAkhilesh Kumar ShrivasPublished in: ICACNI (2013)
Keyphrases
- intrusion detection system
- intrusion detection
- alert correlation
- feature selection
- attack detection
- network security
- network intrusions
- attack scenarios
- computer networks
- network traffic
- anomaly detection
- denial of service attacks
- network attacks
- computer security
- normal behavior
- cyber attacks
- normal traffic
- malicious activities
- misuse detection
- distributed intrusion detection
- network intrusion
- network intrusion detection
- model selection
- data mining techniques
- network intrusion detection systems
- security measures
- probabilistic model
- text classification
- cyber security
- computer systems
- intrusion prevention
- training data