Analysis of Control Flow Events for Timing-based Runtime Anomaly Detection.
Sixing LuRoman LyseckyPublished in: WESS (2015)
Keyphrases
- anomaly detection
- control flow
- intrusion detection system
- behavior analysis
- intrusion detection
- detecting anomalies
- network traffic
- network intrusion detection
- cumulative sum
- network security
- process model
- anomalous behavior
- network anomaly detection
- detecting anomalous
- probabilistic model
- data flow
- one class support vector machines
- open source