Sampling High Throughput Data for Anomaly Detection of Data-Base Activity.
Hagit Grushka-CohenOded SoferOfer BillerMichael DymshitsLior RokachBracha ShapiraPublished in: CoRR (2017)
Keyphrases
- anomaly detection
- intrusion detection
- detecting anomalies
- abnormal activity
- anomalous behavior
- network anomaly detection
- network intrusion detection
- behavior analysis
- unsupervised anomaly detection
- network traffic
- intrusion detection system
- negative selection algorithm
- computer security
- human activities
- one class support vector machines
- databases
- detect anomalies
- detecting anomalous
- network intrusion
- unsupervised learning
- network security
- supervised learning
- bayesian networks
- data sets
- connectionist systems
- computer vision