This book presents the need for intrusion detection system as it has become an essential concern with the growing use of internet and increased network attacks such as virus, Trojan horse, worms and creative hackers. In addition, the basic details about the historic origin of IDS, the types of IDS, their deployment schemes and general architecture are considered. IDS using various machine learning techniques like fuzzy logic, genetic algorithm, neural network, decision tree etc are discussed and their pros and cons are discussed. Another potential approach is ensemble learning, which have been successfully applied to IDS for differentiating normal and anomalous types. In this book, various ensemble approaches like neuro-genetic, neuro-fuzzy, neurotree etc are explained. The implementation of these IDS depends again on the requirement of the security administrator. The IDS discussed in this book are adaptive to new environments by updating the audit data with recent attacks. If new attacks are identified these approaches can store the attack patterns in log generator for detecting future attacks.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dr.Siva S.Sivatha Sindhu received her PhD in Information Security from Anna University,Chennai. She is a member of IEEE and CSI. She has published more than 40 research papers in reputed journals including Elsevier, Springer etc. Her areas of interest are Intrusion Detection System, Machine Laearning Techniques, Network Security etc.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New. Bestandsnummer des Verkäufers 20342561-n
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store US, Wood Dale, IL, USA
PAP. Zustand: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9783659410352
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 20342561
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9783659410352
Anzahl: Mehr als 20 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9783659410352_new
Anzahl: Mehr als 20 verfügbar
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
Paperback. Zustand: New. Bestandsnummer des Verkäufers 6666-IUK-9783659410352
Anzahl: 10 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: New. Bestandsnummer des Verkäufers 20342561-n
Anzahl: Mehr als 20 verfügbar
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book presents the need for intrusion detection system as it has become an essential concern with the growing use of internet and increased network attacks such as virus, Trojan horse, worms and creative hackers. In addition, the basic details about the historic origin of IDS, the types of IDS, their deployment schemes and general architecture are considered. IDS using various machine learning techniques like fuzzy logic, genetic algorithm, neural network, decision tree etc are discussed and their pros and cons are discussed. Another potential approach is ensemble learning, which have been successfully applied to IDS for differentiating normal and anomalous types. In this book, various ensemble approaches like neuro-genetic, neuro-fuzzy, neurotree etc are explained. The implementation of these IDS depends again on the requirement of the security administrator. The IDS discussed in this book are adaptive to new environments by updating the audit data with recent attacks. If new attacks are identified these approaches can store the attack patterns in log generator for detecting future attacks. 80 pp. Englisch. Bestandsnummer des Verkäufers 9783659410352
Anzahl: 2 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 20342561
Anzahl: Mehr als 20 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Sindhu Siva S. SivathaDr.Siva S.Sivatha Sindhu received her PhD in Information Security from Anna University,Chennai. She is a member of IEEE and CSI. She has published more than 40 research papers in reputed journals including Else. Bestandsnummer des Verkäufers 5154491
Anzahl: Mehr als 20 verfügbar