Towards vulnerability-based intrusion detection with event processing.
Amer FarroukhMohammad SadoghiHans-Arno JacobsenPublished in: DEBS (2011)
Keyphrases
- intrusion detection
- event processing
- security vulnerabilities
- complex event processing
- intrusion detection system
- anomaly detection
- stream processing
- complex events
- network security
- network traffic
- information security
- data mining
- dynamic reconfiguration
- data mining techniques
- local area network
- publish subscribe systems
- real time
- event recognition
- machine learning
- data warehouse
- reinforcement learning