Using Decision Tree Analysis for Intrusion Detection: A How-To Guide
As cyber threats grow in sophistication, network defenders need to use every tool in the defensive arsenal to protect their networks. Data mining techniques, such as decision tree analysis, offer a semi-automated approach to detect adversary threats. This paper presents a repeatable process to...