Training a neural-network based intrusion detector to recognize novel attacks.
Susan C. LeeDavid V. HeinbuchPublished in: IEEE Trans. Syst. Man Cybern. Part A (2001)
Keyphrases
- malicious users
- denial of service attacks
- training set
- training phase
- training process
- intrusion detection and prevention
- test set
- training examples
- intrusion detection
- detection algorithm
- detection method
- training samples
- intrusion detection system
- training algorithm
- anomaly detection
- computer systems
- digital images
- network intrusions
- data mining