Reduce positive and negative falses from attacks collected from the deployment of distributed honeypot network.
Abdeljalil AgnaouAnas Abou El KalamAbdellah Ait OuahmanMina De MontfortPublished in: CoRR (2016)
Keyphrases
- positive and negative
- peer to peer
- computer networks
- distributed network
- traffic analysis
- positive or negative
- decision rules
- communication cost
- training instances
- distributed systems
- forensic analysis
- network nodes
- positive examples
- traffic data
- real world
- network traffic
- countermeasures
- bandwidth consumption
- expert systems
- security threats
- network attacks
- denial of service attacks
- dos attacks
- novelty detection
- mobile agents
- intrusion detection
- decision trees