"Anomaly-based detection, attack, bayesian networks, WEKA"@en . "[D367EF45D4B2]" . "Anomaly-based Network Intrusion Detection Methods" . "Nevlud, Pavel" . "Vol 11" . "27240" . "V" . . . . "4"^^ . "The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization our results. The WEKA is a collection of machine learning algorithms for data mining tasks."@en . "7"^^ . . "4"^^ . "Kapi\u010D\u00E1k, Luk\u00E1\u0161" . "Advances in Electrical and Electronic Engineering" . . . "RIV/61989100:27240/13:86088633!RIV14-MSM-27240___" . . "The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization our results. The WEKA is a collection of machine learning algorithms for data mining tasks." . . "http://advances.utc.sk/index.php/AEEE/article/view/877/909" . "Anomaly-based Network Intrusion Detection Methods"@en . . . . "RIV/61989100:27240/13:86088633" . "CZ - \u010Cesk\u00E1 republika" . "61318" . . . "Bure\u0161, Miroslav" . "Anomaly-based Network Intrusion Detection Methods"@en . "Zdr\u00E1lek, Jaroslav" . "Anomaly-based Network Intrusion Detection Methods" . "1336-1376" . . . . . . "6" . .