PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

Machine Learning Algorithms with Feature Reduction Mechanism for Intrusion Detection System

Gulab Sah

$70.95   $60.68

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Mohd Abdul Hafi
21 February 2024
In modern society, the internet-based services are getting too much popularity from last few decads. In today's world, people typically use smartphones, laptops, tablets and other gadgets to access these services at any time, from anywhere. Therefore, data that streams via these networks may contain essential or sensitive information. Moreover, due to advancement of internet technology, the sensitive data is always transmitted between devices and data-warehouse for storing and retrieval purpose. These results open trapdoor for the attackers to launch the widespread of attacks that may be threatend to the organisation and/or the individuals. Attackers use a variety of cutting-edge approaches to take advantage of system security flaws. This might result in the misuse of confidential or delicate information, unauthorised access to the system, or a breach of client accounts. Security professionals and system administrators must employ the advanced security techniques to defend against these threats. Additionally, as new technologies developed for instance big data, IoTs, etc., the vast volumes of traffic or data are also growing, gradually. Therefore, updating the attack signature is getting harder, slower, and more tedious because of the network data traffic expanding significantly. Moreover, searching through such large amounts of data in hunt of relevant or useful evidence is a critical task for data scientists, commercial corporations, and marketers. Hence, network security is presently a rising field of study for scientists and academics because of increased traffic and extensive internet usage. Researchers in these fields (network security) attempt to prevent intrusions or attackers from exploiting system or network vulnerabilities to gain unauthorised entry (s). Although many prevention technologies such as Antivirus, firewalls, etc., for securing a network or system have been developed since last two decades to detect and eliminate potential attacks such as DoS, user to root (U2R), remote to local (R2L), Probe, etc. As a result, fundamental security procedures are needed to identify new kinds of attacks as well as unwanted traffic or data that could harm or disrupt a particular host or network.

By:  
Imprint:   Mohd Abdul Hafi
Dimensions:   Height: 279mm,  Width: 216mm,  Spine: 8mm
Weight:   358g
ISBN:   9798224227990
Pages:   148
Publication Date:  
Audience:   General/trade ,  ELT Advanced
Format:   Paperback
Publisher's Status:   Active

See Also