Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems.
Dominique AlessandriPublished in: Recent Advances in Intrusion Detection (2000)
Keyphrases
- supervised learning
- intrusion detection system
- intrusion detection
- network security
- computer networks
- machine learning
- network intrusion detection
- network traffic
- anomaly detection
- computer security
- distributed intrusion detection
- semi supervised
- computer systems
- attack detection
- alert correlation
- intrusion prevention
- network intrusion detection systems
- denial of service attacks
- cyber attacks
- misuse detection
- data mining techniques
- normal behavior
- cyber security
- network attacks
- data mining
- feature selection
- rule base
- real world