|
|
Showing 1 - 4 of
4 matches in All Departments
This book covers the basic statistical and analytical techniques of computer intrusion detection. It is aimed at both statisticians looking to become involved in the data analysis aspects of computer security and computer scientists looking to expand their toolbox of techniques for detecting intruders. The book is self-contained, assumng no expertise in either computer security or statistics. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code. Each section develops the necessary tools as needed. There is an extensive discussion of visualization as it relates to network data and intrusion detection. The book also contains a large bibliography covering the statistical, machine learning, and pattern recognition literature related to network monitoring and intrusion detection. David Marchette is a scientist at the Naval Surface Warfacre Center in Dalhgren, Virginia. He has worked at Navy labs for 15 years, doing research in pattern recognition, computational statistics, and image analysis. He has been a fellow by courtesy in the mathematical sciences department of the Johns Hopkins University since 2000. He has been working in conputer intrusion detection for several years, focusing on statistical methods for anomaly detection and visualization. Dr. Marchette received a Masters in Mathematics from the University of California, San Diego in 1982 and a Ph.D. in Computational Sciences and Informatics from George Mason University in 1996.
Cybersecurity Analytics is for the cybersecurity student and
professional who wants to learn data science techniques critical
for tackling cybersecurity challenges, and for the data science
student and professional who wants to learn about cybersecurity
adaptations. Trying to build a malware detector, a phishing email
detector, or just interested in finding patterns in your datasets?
This book can let you do it on your own. Numerous examples and
datasets links are included so that the reader can "learn by
doing." Anyone with a basic college-level calculus course and some
probability knowledge can easily understand most of the material.
The book includes chapters containing: unsupervised learning,
semi-supervised learning, supervised learning, text mining, natural
language processing, and more. It also includes background on
security, statistics, and linear algebra. The website for the book
contains a listing of datasets, updates, and other resources for
serious practitioners.
This book covers the basic statistical and analytical techniques of
computer intrusion detection. It is the first to present a
data-centered approach to these problems. It begins with a
description of the basics of TCP/IP, followed by chapters dealing
with network traffic analysis, network monitoring for intrusion
detection, host based intrusion detection, and computer viruses and
other malicious code.
Cybersecurity Analytics is for the cybersecurity student and
professional who wants to learn data science techniques critical
for tackling cybersecurity challenges, and for the data science
student and professional who wants to learn about cybersecurity
adaptations. Trying to build a malware detector, a phishing email
detector, or just interested in finding patterns in your datasets?
This book can let you do it on your own. Numerous examples and
datasets links are included so that the reader can "learn by
doing." Anyone with a basic college-level calculus course and some
probability knowledge can easily understand most of the material.
The book includes chapters containing: unsupervised learning,
semi-supervised learning, supervised learning, text mining, natural
language processing, and more. It also includes background on
security, statistics, and linear algebra. The website for the book
contains a listing of datasets, updates, and other resources for
serious practitioners.
|
|