Enhancing Computer Security with Smart Technology
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjec...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1448 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1448 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-14482009-12-02T08:15:32Z Enhancing Computer Security with Smart Technology Vemuri, V. Rao Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance. Cyber-Security and Cyber-Trust V Rao Vemuri Introduction Cyber-Security Cyber-Trust What the Future Holds Network Firewalls Kenneth Ingham and Stephanie Forrest Abstract Introduction The Need for Firewalls Firewall Architectures Firewalls at Various ISO Network Layers Other Approaches Firewall Testing What Firewalls Do Not Protect Against Future Challenges for Firewalls Conclusion References Web Application Security: The Next Battleground Abhishek Kumar, Roshen Chandran, and Vinod Vasudevan Threats to Web Applications Vulnerabilities in Web Applications Attack Techniques Preventing Vulnerabilities in Web Applications Conclusion Notes References Relevance of Machine Learning V Rao Vemuri Introduction Place of Intrusion Detection in the Security Landscape Machine Learning beyond Intrusion Detection Machine Learning and Computational Learning Theory Some Popular Machine Learning Methods Making Machine Learning More Useful Summary References Machine Learning in Intrusion Detection Yihua Liao and V Rao Vemuri Introduction Intrusion Detection Machine Learning Approaches to Anomaly Detection Audit Data. Issues in Anomaly Detection Open Questions and Future Directions Illustrative Example: Adaptive Anomaly Detection Summary References Cyber-Security Challenges: Designing Efficient Intrusion Detection Systems and Anti-Virus Tools Srinivas Mukkamala, Andrew Sung, and Ajith Abraham Introduction to IDSs A Review on IDSs Computer Attack Taxonomy Significant Feature Selection for Intrusion Detection Detection of Probes and DoS Attacks Attacks on IDSs Attacks on Anti-Virus Tools Conclusions Acknowledgments References Artificial Immune Systems in Intrusion Detection Dipankar Dasgupta and Fabio Gonzalez Introduction Artificial Immune Systems RNS Intrusion Detection Problem Experimentation Summary Bibliography Application of Wavelets in Network Security Challa S. Sastry and Sanjay Rawat Introduction A Brief Introduction to Self-Similarity A Brief Introduction to Wavelet Analysis Application of Wavelets Wavelets for HIDS Wavelets for Network-Based IDS Simulation Results An Observation for Future Work and Conclusion Appendix Acknowledgment References Application of Exploratory Multivariate Analysis for Network Security Khaled Labib and V Rao Vemuri Abstract Introduction The Intrusion Detection Problem The S Language and Its Environment Introduction to Multivariate Analysis Methods DoS and Network Probe Attacks Data Collection and Preprocessing Results Acknowledgment References Index 2009-12-02T08:15:32Z 2009-12-02T08:15:32Z 2005 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1448 en application/rar CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.
Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security.
A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance. |
format |
Book |
author |
Vemuri, V. Rao |
spellingShingle |
Vemuri, V. Rao Enhancing Computer Security with Smart Technology |
author_facet |
Vemuri, V. Rao |
author_sort |
Vemuri, V. Rao |
title |
Enhancing Computer Security with Smart Technology |
title_short |
Enhancing Computer Security with Smart Technology |
title_full |
Enhancing Computer Security with Smart Technology |
title_fullStr |
Enhancing Computer Security with Smart Technology |
title_full_unstemmed |
Enhancing Computer Security with Smart Technology |
title_sort |
enhancing computer security with smart technology |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1448 |
_version_ |
1757672098014167040 |