A Transitional View of Immune Inspired Techniques for Anomaly Detection.
Guilherme Costa SilvaReinaldo M. PalharesWalmir M. CaminhasPublished in: IDEAL (2012)
Keyphrases
- anomaly detection
- intrusion detection
- anomalous behavior
- detecting anomalies
- network intrusion detection
- unsupervised anomaly detection
- computer security
- network traffic
- behavior analysis
- intrusion detection system
- network anomaly detection
- network security
- detecting anomalous
- detect anomalies
- unsupervised learning
- computational intelligence
- one class support vector machines
- negative selection algorithm
- computer vision
- data mining
- support vector machine
- network intrusion
- feature space
- connectionist systems