Reconstruction-based anomaly detection for the cloud: A comparison on the Yahoo! Webscope S5 dataset.
Tanja HagemannKaterina KatsarouPublished in: ICCBDC (2020)
Keyphrases
- anomaly detection
- intrusion detection
- network intrusion detection
- anomalous behavior
- network traffic
- detecting anomalies
- network anomaly detection
- computer security
- detecting anomalous
- behavior analysis
- intrusion detection system
- one class support vector machines
- detect anomalies
- cloud computing
- unsupervised learning
- high resolution
- connectionist systems
- unsupervised anomaly detection
- malware detection
- network security
- model selection
- hidden markov models
- network intrusion
- negative selection algorithm
- data mining
- neural network