Counterfeit Anomaly Using Generative Adversarial Network for Anomaly Detection.
Haocheng ShenJingkun ChenRuixuan WangJianguo ZhangPublished in: IEEE Access (2020)
Keyphrases
- anomaly detection
- network traffic
- network anomaly detection
- detect anomalies
- intrusion detection
- network intrusion
- network intrusion detection
- anomalous behavior
- normal behavior
- detecting anomalies
- unsupervised learning
- intrusion detection system
- computer networks
- computer security
- network security
- unsupervised anomaly detection
- anomaly based intrusion detection
- detecting anomalous
- one class support vector machines
- behavior analysis
- network structure
- knowledge discovery
- traffic patterns
- learning algorithm
- reinforcement learning