An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection.
Like ZhangGregory B. WhitePublished in: IPDPS (2007)
Keyphrases
- network intrusion detection
- anomaly detection
- intrusion detection
- network attacks
- anomaly based intrusion detection
- detect anomalies
- network traffic
- intrusion detection system
- network intrusion
- normal behavior
- artificial immune
- network intrusions
- network anomaly detection
- fraud detection
- detection algorithm
- computer networks
- network security
- network traffic data
- abnormal behavior
- data mining
- information security
- unsupervised learning
- text mining
- multi class
- pairwise
- metadata
- information retrieval