Читать книгу Intelligent Network Management and Control - Badr Benmammar - Страница 17
1.3.2. Techniques based on data exploration
ОглавлениеData exploration aims to eliminate the manual elements used for the design of intrusion detection systems. Various data exploration techniques have been developed and widely used. The main data exploration techniques are presented in the following sections.