Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
RhongHo JangSeongkwang MoonYoungtae NohAziz MohaisenDaeHun NyangPublished in: CoRR (2019)
Keyphrases
- anomaly detection
- working set
- working set selection
- decomposition algorithm
- intrusion detection
- anomalous behavior
- detecting anomalies
- network anomaly detection
- network intrusion detection
- one class support vector machines
- network traffic
- intrusion detection system
- decomposition methods
- detect anomalies
- training support vector machines
- kernel matrix
- unsupervised learning
- negative selection algorithm
- decomposition method
- data mining
- database management systems
- support vector machine
- search space