Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

By: Bhattacharyya, Dhruba KMaterial type: TextTextPublisher: Boca Raton : CRC Press, Taylor & Francis Group, [2014]Description: xxv, 340 pages ; 24 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781466582088 (hardback : acidfree paper)Subject(s): Computer networks -- Security measures | Intrusion detection systems (Computer security) | Machine learning | COMPUTERS / Machine Theory | COMPUTERS / Security / General | COMPUTERS / Security / CryptographyDDC classification: 005.8 BHA LOC classification: TK5105.59 | .B474 2014Other classification: COM037000 | COM053000 | COM083000 Summary: "This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in captured network traffic data to look for anomalous patterns that may correspond to attempts at unauthorized intrusion. The reader will be given a technical and sophisticated description of such algorithms and their applications in the context of intrusion detection in networks"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Shelving location Call number Status Date due Barcode Item holds
Book Book Central Library (CL)
Central Library (CL)
NFIC First Floor - Artificial Intelligence/Data Mining 005.8 BHA (Browse shelf) Available SEECS013756
Total holds: 0

Includes bibliographical references (pages 295-336) and index.

"This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in captured network traffic data to look for anomalous patterns that may correspond to attempts at unauthorized intrusion. The reader will be given a technical and sophisticated description of such algorithms and their applications in the context of intrusion detection in networks"-- Provided by publisher.

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.