Network anomaly detection : (Record no. 71033)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02208cam a2200361Ii 4500 |
001 - CONTROL NUMBER | |
control field | 9780429166877 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180331t20142014fluad ob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780429166877 |
-- | (e-book : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | (hardback) |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
-- | B575 |
100 1# - AUTHOR NAME | |
Author | Bhattacharyya, Dhruba K., |
245 10 - TITLE STATEMENT | |
Title | Network anomaly detection : |
Sub Title | a machine learning perspective / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | 1. Introduction -- 2. Networks and anomalies -- 3. An overview of machine learning methods -- 4. Detecting anomalies in network data -- 5. Feature selection -- 6. Approaches to network anomaly detection -- 7. Evaluation methods -- 8. Tools and systems -- 9. Open issues, challenges and concluding remarks. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in captured network traffic data to look for anomalous patterns that may correspond to attempts at unauthorized intrusion. The reader will be given a technical and sophisticated description of such algorithms and their applications in the context of intrusion detection in networks-- |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Kalita, Jugal Kumar, |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.taylorfrancis.com/books/9781466582095 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Boca Raton : |
-- | CRC Press, |
-- | [2014] |
264 #4 - | |
-- | ©2014 |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
520 ## - SUMMARY, ETC. | |
-- | Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Intrusion detection systems (Computer security) |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Machine learning. |
No items available.