作者: Philip K. Chan , Matthew V. Mahoney , Muhammad H. Arshad
关键词: Artificial intelligence 、 Signature (logic) 、 Computer science 、 Pattern recognition 、 Intrusion detection system 、 Construct (python library) 、 Outlier 、 Machine learning 、 Cluster analysis 、 Signature detection 、 Anomaly detection
摘要: Much of the intrusion detection research focuses on signature (misuse) detection, where models are built to recognize known attacks. However, by its nature, cannot detect novel Anomaly modeling normal behavior and identifying significant deviations, which could be In this chapter we explore two machine learning methods that can construct anomaly from past behavior. The first method is a rule algorithm characterizes in absence labeled attack data. second uses clustering identify outliers.