作者: Wenke Lee , Salvatore J. Stolfo
DOI: 10.21236/ADA401496
关键词: Artificial intelligence 、 Computer science 、 Data mining 、 Key (cryptography) 、 Anomaly-based intrusion detection system 、 Machine learning 、 System call 、 Pattern recognition (psychology) 、 Feature selection 、 Construct (python library) 、 Association rule learning 、 Intrusion detection system
摘要: … of building an intrusion detection system. We take a data-centric point of view and consider intrusion detection as a data analysis process. Anomaly detection is about finding the normal …