<P>With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming patte
Network anomaly detection: a machine learning perspective
โ Scribed by Bhattacharyya, Dhruba K
- Publisher
- CRC Press, Taylor & Francis Group
- Year
- 2014
- Tongue
- English
- Leaves
- 364
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
IntroductionThe Internet and Modern NetworksNetwork VulnerabilitiesAnomalies and Anomalies in NetworksMachine LearningPrior Work on Network Anomaly DetectionContributions of This BookOrganizationNetworks and AnomaliesNetworking BasicsAnomalies in a NetworkAn Overview of Machine Learning MethodsIntroductionTypes of Machine Learning MethodsSupervised Learning: Some Popular MethodsUnsupervised LearningProbabilistic LearningSoft ComputingReinforcement LearningHybrid Learning MethodsDiscussionDetecting Anomalies in Network DataDetection of Network AnomaliesAspects of Network Anomaly DetectionDatasetsDiscussionFeature SelectionFeature Selection vs. Feature ExtractionFeature RelevanceAdvantagesApplications of Feature SelectionPrior Surveys on Feature SelectionProblem FormulationSteps in Feature SelectionFeature Selection Methods: A TaxonomyExisting Methods of Feature SelectionSubset Evaluation MeasuresSystems and Tools for Feature SelectionDiscussionApproaches to Network Anomaly DetectionNetwork Anomaly Detection MethodsTypes of Network Anomaly Detection MethodsAnomaly Detection Using Supervised LearningAnomaly Detection Using Unsupervised LearningAnomaly Detection Using Probabilistic LearningAnomaly Detection Using Soft ComputingKnowledge in Anomaly DetectionAnomaly Detection Using Combination LearnersDiscussionEvaluation MethodsAccuracyPerformanceCompletenessTimelinessStabilityInteroperabilityData Quality, Validity and ReliabilityAlert InformationUnknown Attacks DetectionUpdating ReferencesDiscussionTools and SystemsIntroductionAttack Related ToolsAttack Detection SystemsDiscussionOpen Issues, Challenges and Concluding RemarksRuntime Limitations for Anomaly Detection SystemsReducing the False Alarm RateIssues in Dimensionality ReductionComputational Needs of Network Defense MechanismsDesigning Generic Anomaly Detection SystemsHandling Sophisticated AnomaliesAdaptability to Unknown AttacksDetecting and Handling Large-Scale AttacksInfrastructure AttacksHigh Intensity AttacksMore Inventive AttacksConcluding RemarksReferencesIndex
โฆ Subjects
Aprendizaje automรกtico (Inteligencia artificial);Computer networks--Safety measures;Computer networks--Security measures;Intrusion detection systems (Computer security);Machine learning;Redes de ordenadores--Medidas de seguridad;Seguridad informรกtica;Redes de ordenadores -- Medidas de seguridad;Seguridad informaฬtica;Aprendizaje automaฬtico (Inteligencia artificial);Computer networks -- Security measures;Computer networks -- Safety measures
๐ SIMILAR VOLUMES
Anomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets. But, unlike Sherlock Holmes, you may not know what the puzzle is, much less what โsuspectsโ youโre looking for. This OโReilly report uses
Annotation
<p>Anomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets. But, unlike Sherlock Holmes, you may not know what the puzzle is, much less what suspects you’re looking for. This O’Reilly
<p>This book introduces the latest research on advanced control charts and new machine learning approaches to detect abnormalities in the smart manufacturing process. By approaching anomaly detection using both statistics and machine learning, the book promotes interdisciplinary cooperation between
<p>This book introduces the latest research on advanced control charts and new machine learning approaches to detect abnormalities in the smart manufacturing process. By approaching anomaly detection using both statistics and machine learning, the book promotes interdisciplinary cooperation between