Login / Signup
Anomaly detection of policies in distributed firewalls using data log analysis.
Azam Andalib
Seyed Morteza Babamir
Published in:
J. Supercomput. (2023)
Keyphrases
</>
anomaly detection
data sources
log data
intrusion detection system
databases
data analysis
intrusion detection
website
detect anomalies
log files
end users
unsupervised learning
data mining techniques
knowledge discovery
log analysis
detecting anomalies
training data
network anomaly detection