Network anomaly detection : a machine learning perspective / / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.
"This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in ca...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2014 |
Language: | English |
Online Access: | |
Physical Description: | xxv, 336 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02020nam a2200385 a 4500 | ||
---|---|---|---|
001 | 5001316406 | ||
003 | MiAaPQ | ||
005 | 20200520144314.0 | ||
006 | m o d | | ||
007 | cr cn||||||||| | ||
008 | 130425s2014 fluad sb 000 0 eng d | ||
010 | |z 2013014913 | ||
020 | |z 9781466582088 (hardback) | ||
020 | |z 9781466582095 (e-book) | ||
035 | |a (MiAaPQ)5001316406 | ||
035 | |a (Au-PeEL)EBL1316406 | ||
035 | |a (CaPaEBR)ebr10733709 | ||
035 | |a (CaONFJC)MIL515568 | ||
035 | |a (OCoLC)854975437 | ||
040 | |a MiAaPQ |c MiAaPQ |d MiAaPQ | ||
050 | 4 | |a TK5105.59 |b .B474 2014 | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Bhattacharyya, Dhruba K. | |
245 | 1 | 0 | |a Network anomaly detection |h [electronic resource] : |b a machine learning perspective / |c Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita. |
260 | |a Boca Raton : |b CRC Press, |c 2014. | ||
300 | |a xxv, 336 p. : |b ill. | ||
504 | |a Includes bibliographical references. | ||
520 | |a "This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in captured network traffic data to look for anomalous patterns that may correspond to attempts at unauthorized intrusion. The reader will be given a technical and sophisticated description of such algorithms and their applications in the context of intrusion detection in networks"-- |c Provided by publisher. | ||
533 | |a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Intrusion detection systems (Computer security) | |
650 | 0 | |a Machine learning. | |
655 | 4 | |a Electronic books. | |
710 | 2 | |a ProQuest (Firm) | |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1316406 |z Click to View |