Network anomaly detection : a machine learning perspective / / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

"This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in ca...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2014
Language:English
Online Access:
Physical Description:xxv, 336 p. :; ill.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02020nam a2200385 a 4500
001 5001316406
003 MiAaPQ
005 20200520144314.0
006 m o d |
007 cr cn|||||||||
008 130425s2014 fluad sb 000 0 eng d
010 |z  2013014913 
020 |z 9781466582088 (hardback) 
020 |z 9781466582095 (e-book) 
035 |a (MiAaPQ)5001316406 
035 |a (Au-PeEL)EBL1316406 
035 |a (CaPaEBR)ebr10733709 
035 |a (CaONFJC)MIL515568 
035 |a (OCoLC)854975437 
040 |a MiAaPQ  |c MiAaPQ  |d MiAaPQ 
050 4 |a TK5105.59  |b .B474 2014 
082 0 4 |a 005.8  |2 23 
100 1 |a Bhattacharyya, Dhruba K. 
245 1 0 |a Network anomaly detection  |h [electronic resource] :  |b a machine learning perspective /  |c Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita. 
260 |a Boca Raton :  |b CRC Press,  |c 2014. 
300 |a xxv, 336 p. :  |b ill. 
504 |a Includes bibliographical references. 
520 |a "This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in captured network traffic data to look for anomalous patterns that may correspond to attempts at unauthorized intrusion. The reader will be given a technical and sophisticated description of such algorithms and their applications in the context of intrusion detection in networks"--  |c Provided by publisher. 
533 |a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Intrusion detection systems (Computer security) 
650 0 |a Machine learning. 
655 4 |a Electronic books. 
710 2 |a ProQuest (Firm) 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1316406  |z Click to View