Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept.
William YurcikPublished in: LCN (2002)
Keyphrases
- false positives
- intrusion detection system
- intrusion detection
- network security
- false negative
- network intrusion detection
- anomaly detection
- network traffic
- computer networks
- false positive rate
- detection rate
- number of false positives
- distributed intrusion detection
- intrusion prevention
- computer security
- denial of service attacks
- true positive
- malicious activities
- false alarms
- cyber attacks
- low false positive rate
- attack detection
- computer systems
- cyber security
- alert correlation
- network intrusion detection systems
- network intrusions
- detection algorithm
- machine learning
- training data
- network attacks
- information retrieval
- network intrusion