An automated closed-loop framework to enforce security policies from anomaly detection.
João HenriquesFilipe CaldeiraTiago CruzPaulo SimõesPublished in: Comput. Secur. (2022)
Keyphrases
- anomaly detection
- closed loop
- security policies
- intrusion detection
- open loop
- network security
- control scheme
- anomalous behavior
- control system
- network intrusion detection
- access control
- one class support vector machines
- network traffic
- feedback control
- parameter identification
- detecting anomalies
- intrusion detection system
- maximum likelihood
- computer vision
- neural network