Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment.
Nikolaos AvourdiadisAndrew BlythPublished in: ECIW (2005)
Keyphrases
- intrusion detection
- data fusion
- database
- intrusion detection system
- data sets
- data mining techniques
- network security
- network traffic
- data sources
- multiple sensors
- data analysis
- anomaly detection
- data collection
- training data
- information fusion
- multi source
- machine learning
- data processing
- distributed databases
- association rules
- multi sensor
- network intrusion detection
- wireless sensor networks
- network intrusion