These keywords were added by machine and not by the authors. Minnesota Intrusion Detection System (MINDS).Finally, it presents the strengths and weaknesses of each category of detection techniques and systems with a detailed comparison. They are statistical techniques and systems, classification-based techniques and systems, clustering and outlier-based techniques and systems, soft computing-based techniques and systems, knowledge-based techniques and systems, and techniques and systems based on combination learners. This chapter is organized into six major sections to describe different network anomaly detection techniques and systems. This chapter starts with a discussion of the basic properties of network-wide traffic with an example. To develop a network traffic anomaly detection technique and system, it is indeed necessary to know the basic properties of network-wide traffic.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |