|
Showing 1 - 1 of
1 matches in All Departments
This book presents the need for intrusion detection system as it
has become an essential concern with the growing use of internet
and increased network attacks such as virus, Trojan horse, worms
and creative hackers. In addition, the basic details about the
historic origin of IDS, the types of IDS, their deployment schemes
and general architecture are considered. IDS using various machine
learning techniques like fuzzy logic, genetic algorithm, neural
network, decision tree etc are discussed and their pros and cons
are discussed. Another potential approach is ensemble learning,
which have been successfully applied to IDS for differentiating
normal and anomalous types. In this book, various ensemble
approaches like neuro-genetic, neuro-fuzzy, neurotree etc are
explained. The implementation of these IDS depends again on the
requirement of the security administrator. The IDS discussed in
this book are adaptive to new environments by updating the audit
data with recent attacks. If new attacks are identified these
approaches can store the attack patterns in log generator for
detecting future attacks.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.