Intrusion detection and virology: an analysis of differences, similarities and complementariness.
Benjamin MorinLudovic MéPublished in: J. Comput. Virol. (2007)
Keyphrases
- intrusion detection
- anomaly detection
- intrusion detection system
- network security
- network traffic
- network intrusion detection
- data sets
- data mining techniques
- outlier mining
- detecting anomalous
- training data
- cyber security
- high detection rate
- artificial immune
- network intrusion detection systems
- false positives and false negatives
- feature selection
- machine learning
- data mining