A Clustering Approach to Wireless Network Intrusion Detection.
Shi ZhongTaghi M. KhoshgoftaarShyam Varan NathPublished in: ICTAI (2005)
Keyphrases
- network intrusion detection
- anomaly detection
- intrusion detection
- network intrusion
- fraud detection
- clustering algorithm
- artificial immune
- k means
- network anomaly detection
- intrusion detection system
- wireless networks
- outlier detection
- self organizing maps
- network traffic data
- network traffic
- wireless communication
- network attacks
- databases
- network security
- unsupervised learning
- knowledge discovery
- mobile devices
- training set
- data analysis
- data mining