Network security is a serious global concern. The increasing prevalence of malware and incidents of attacks hinders the utilization of the Internet to its greatest benefit and incur significant economic losses. The traditional approaches in securing systems against threats are designing mechanisms that create a protective shield, almost always with vulnerabilities. This has created Intrusion Detection Systems to be developed that complement traditional approaches. However, with the advancement of computer technology, the behavior of intrusions has become complex that makes the work of security experts hard to analyze and detect intrusions. In order to address these challenges, data mining techniques have become a possible solution. However, the performance of data mining algorithms is affected when no optimized features are provided. This is because, complex relationships can be seen as well between the features and intrusion classes contributing to high computational costs in processing tasks, subsequently leads to delays in identifying intrusions. Feature selection is thus important in detecting intrusions by allowing the data mining system to focus on what is really important.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Network security is a serious global concern. The increasing prevalence of malware and incidents of attacks hinders the utilization of the Internet to its greatest benefit and incur significant economic losses. The traditional approaches in securing systems against threats are designing mechanisms that create a protective shield, almost always with vulnerabilities. This has created Intrusion Detection Systems to be developed that complement traditional approaches. However, with the advancement of computer technology, the behavior of intrusions has become complex that makes the work of security experts hard to analyze and detect intrusions. In order to address these challenges, data mining techniques have become a possible solution. However, the performance of data mining algorithms is affected when no optimized features are provided. This is because, complex relationships can be seen as well between the features and intrusion classes contributing to high computational costs in processing tasks, subsequently leads to delays in identifying intrusions. Feature selection is thus important in detecting intrusions by allowing the data mining system to focus on what is really important.
Yogesh Kumar has done M Tech (CSE) from PIT (PTU Main campus), Kapurthala, India. Currently, he is an Assistant Professor at BGIET, Sangrur, India. His general research Interests are in the areas of Information Security and Computer Networks.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Network security is a serious global concern. The increasing prevalence of malware and incidents of attacks hinders the utilization of the Internet to its greatest benefit and incur significant economic losses. The traditional approaches in securing systems against threats are designing mechanisms that create a protective shield, almost always with vulnerabilities. This has created Intrusion Detection Systems to be developed that complement traditional approaches. However, with the advancement of computer technology, the behavior of intrusions has become complex that makes the work of security experts hard to analyze and detect intrusions. In order to address these challenges, data mining techniques have become a possible solution. However, the performance of data mining algorithms is affected when no optimized features are provided. This is because, complex relationships can be seen as well between the features and intrusion classes contributing to high computational costs in processing tasks, subsequently leads to delays in identifying intrusions. Feature selection is thus important in detecting intrusions by allowing the data mining system to focus on what is really important. 100 pp. Englisch. Bestandsnummer des Verkäufers 9783659515101
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Network security is a serious global concern. The increasing prevalence of malware and incidents of attacks hinders the utilization of the Internet to its greatest benefit and incur significant economic losses. The traditional approaches in securing systems against threats are designing mechanisms that create a protective shield, almost always with vulnerabilities. This has created Intrusion Detection Systems to be developed that complement traditional approaches. However, with the advancement of computer technology, the behavior of intrusions has become complex that makes the work of security experts hard to analyze and detect intrusions. In order to address these challenges, data mining techniques have become a possible solution. However, the performance of data mining algorithms is affected when no optimized features are provided. This is because, complex relationships can be seen as well between the features and intrusion classes contributing to high computational costs in processing tasks, subsequently leads to delays in identifying intrusions. Feature selection is thus important in detecting intrusions by allowing the data mining system to focus on what is really important. Bestandsnummer des Verkäufers 9783659515101
Anzahl: 1 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND pp. 100. Bestandsnummer des Verkäufers 18127717816
Anzahl: 4 verfügbar
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. pp. 100. Bestandsnummer des Verkäufers 26127717810
Anzahl: 4 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Print on Demand pp. 100 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam. Bestandsnummer des Verkäufers 132869741
Anzahl: 4 verfügbar