|
Showing 1 - 1 of
1 matches in All Departments
Anomaly detection has been a long-standing security approach with
versatile applications, ranging from securing server programs in
critical environments, to detecting insider threats in enterprises,
to anti-abuse detection for online social networks. Despite the
seemingly diverse application domains, anomaly detection solutions
share similar technical challenges, such as how to accurately
recognize various normal patterns, how to reduce false alarms, how
to adapt to concept drifts, and how to minimize performance impact.
They also share similar detection approaches and evaluation
methods, such as feature extraction, dimension reduction, and
experimental evaluation. The main purpose of this book is to help
advance the real-world adoption and deployment anomaly detection
technologies, by systematizing the body of existing knowledge on
anomaly detection. This book is focused on data-driven anomaly
detection for software, systems, and networks against advanced
exploits and attacks, but also touches on a number of applications,
including fraud detection and insider threats. We explain the key
technical components in anomaly detection workflows, give in-depth
description of the state-of-the-art data-driven anomaly-based
security solutions, and more importantly, point out promising new
research directions. This book emphasizes on the need and
challenges for deploying service-oriented anomaly detection in
practice, where clients can outsource the detection to dedicated
security providers and enjoy the protection without tending to the
intricate details.
|
You may like...
Orthodoxy
G. K. Chesterton
Hardcover
R959
Discovery Miles 9 590
|