Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT.
Aria MirzaiAli Zülfükar CobanMagnus AlmgrenWissam AoudiTobias BertilssonPublished in: EuroSec@EUROSYS (2023)
Keyphrases
- intrusion detection
- anomaly detection
- intrusion detection system
- network intrusion detection
- network security
- high detection rate
- data mining
- information security
- network traffic
- maximum likelihood
- detecting anomalous
- scheduling problem
- artificial immune
- network intrusion
- false positives and false negatives
- cyber security
- alert correlation
- detection method
- cloud computing
- data mining techniques
- fraud detection
- information retrieval
- computer security
- data sets
- intrusion prevention