𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Network Anomaly Detection: A Machine Learning Perspective

✍ Scribed by Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita


Publisher
Chapman and Hall/CRC
Year
2013
Tongue
English
Leaves
364
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming patterns in network traffic data compared to normal behavior. Finding these anomalies has extensive applications in areas such as cyber security, credit card and insurance fraud detection, and military surveillance for enemy activities. Network Anomaly Detection: A Machine Learning Perspective presents machine learning techniques in depth to help you more effectively detect and counter network intrusion.

In this book, you’ll learn about:

  • Network anomalies and vulnerabilities at various layers
  • The pros and cons of various machine learning techniques and algorithms
  • A taxonomy of attacks based on their characteristics and behavior
  • Feature selection algorithms
  • How to assess the accuracy, performance, completeness, timeliness, stability, interoperability, reliability, and other dynamic aspects of a network anomaly detection system
  • Practical tools for launching attacks, capturing packet or flow traffic, extracting features, detecting attacks, and evaluating detection performance
  • Important unresolved issues and research challenges that need to be overcome to provide better protection for networks

Examining numerous attacks in detail, the authors look at the tools that intruders use and show how to use this knowledge to protect networks. The book also provides material for hands-on development, so that you can code on a testbed to implement detection methods toward the development of your own intrusion detection system. It offers a thorough introduction to the state of the art in network anomaly detection using machine learning approaches and systems.


πŸ“œ SIMILAR VOLUMES


Practical Machine Learning: A New Look a
✍ Ted Dunning, Ellen Friedman πŸ“‚ Library πŸ“… 2014 πŸ› O’Reilly Media 🌐 English

Anomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets. But, unlike Sherlock Holmes, you may not know what the puzzle is, much less what β€œsuspects” you’re looking for. This O’Reilly report uses

Practical machine learning: a new look a
✍ Ted Dunning;Ellen Friedman πŸ“‚ Library πŸ“… 2014 πŸ› OReilly Media 🌐 English

<p>Anomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets. But, unlike Sherlock Holmes, you may not know what the puzzle is, much less what suspects you&#8217;re looking for. This O&#8217;Reilly

Control Charts and Machine Learning for
✍ Kim Phuc Tran πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>This book introduces the latest research on advanced control charts and new machine learning approaches to detect abnormalities in the smart manufacturing process. By approaching anomaly detection using both statistics and machine learning, the book promotes interdisciplinary cooperation between

Control Charts and Machine Learning for
✍ Kim Phuc Tran πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>This book introduces the latest research on advanced control charts and new machine learning approaches to detect abnormalities in the smart manufacturing process. By approaching anomaly detection using both statistics and machine learning, the book promotes interdisciplinary cooperation between