作者: Sanmeet Kaur , Maninder Singh
DOI: 10.1007/S00521-019-04187-9
关键词: Intrusion detection system 、 Data mining 、 Intrusion 、 False positives and false negatives 、 Recurrent neural network 、 Signature (logic) 、 Computer science
摘要: … In particular, we consider a byte sequence ‘str’ to be a candidate signature string if it occurs in at least ‘λ’ percent of malicious flows. For the signature extraction, a generalized suffix tree-…