Anomaly Detection and Anomaly Location Model for Multiple Attacks Using Finite Automata.
Yoshiki IkedaKenji SawadaPublished in: ICCE (2022)
Keyphrases
- anomaly detection
- normal behavior
- intrusion detection
- anomalous behavior
- network intrusion detection
- network anomaly detection
- finite automata
- computer security
- detecting anomalies
- negative selection algorithm
- intrusion detection system
- computational model
- probabilistic model
- data mining
- network security
- network traffic
- one class support vector machines
- network intrusion
- database