Feature Analysis for ML-based IIoT Intrusion Detection.
Mohanad SarhanSiamak LayeghyMarius PortmannPublished in: CoRR (2021)
Keyphrases
- intrusion detection
- feature analysis
- maximum likelihood
- intrusion detection system
- anomaly detection
- network security
- face recognition
- network intrusion detection
- network traffic
- data mining
- feature extraction
- artificial immune
- high detection rate
- cyber security
- computer security
- data mining techniques
- detecting anomalous
- network intrusion
- alert correlation
- information security
- visual cues
- classification accuracy
- discriminant analysis
- pattern classification
- linear discriminant analysis
- data processing
- object recognition
- network intrusion detection systems