Vemuri | Enhancing Computer Security with Smart Technology | E-Book | sack.de
E-Book

E-Book, Englisch, 288 Seiten

Vemuri Enhancing Computer Security with Smart Technology


Erscheinungsjahr 2005
ISBN: 978-1-4200-3122-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 288 Seiten

ISBN: 978-1-4200-3122-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.

Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security.

A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance.

Vemuri Enhancing Computer Security with Smart Technology jetzt bestellen!

Zielgruppe


IT security managers, CISOs, Computer Science and AI students and professionals


Autoren/Hrsg.


Weitere Infos & Material


Cyber-Security and Cyber-Trust
V Rao Vemuri
Introduction
Cyber-Security
Cyber-Trust
What the Future Holds

Network Firewalls
Kenneth Ingham and Stephanie Forrest
Abstract
Introduction
The Need for Firewalls
Firewall Architectures
Firewalls at Various ISO Network Layers
Other Approaches
Firewall Testing
What Firewalls Do Not Protect Against
Future Challenges for Firewalls
Conclusion
References

Web Application Security: The Next Battleground
Abhishek Kumar, Roshen Chandran, and Vinod Vasudevan
Threats to Web Applications
Vulnerabilities in Web Applications
Attack Techniques
Preventing Vulnerabilities in Web Applications
Conclusion
Notes
References

Relevance of Machine Learning
V Rao Vemuri
Introduction
Place of Intrusion Detection in the Security Landscape
Machine Learning beyond Intrusion Detection
Machine Learning and Computational Learning Theory
Some Popular Machine Learning Methods
Making Machine Learning More Useful
Summary
References

Machine Learning in Intrusion Detection
Yihua Liao and V Rao Vemuri
Introduction
Intrusion Detection
Machine Learning Approaches to Anomaly Detection
Audit Data.
Issues in Anomaly Detection
Open Questions and Future Directions
Illustrative Example: Adaptive Anomaly Detection
Summary
References

Cyber-Security Challenges: Designing Efficient
Intrusion Detection Systems and Anti-Virus Tools
Srinivas Mukkamala, Andrew Sung, and Ajith Abraham
Introduction to IDSs
A Review on IDSs
Computer Attack Taxonomy
Significant Feature Selection for Intrusion Detection
Detection of Probes and DoS Attacks
Attacks on IDSs
Attacks on Anti-Virus Tools
Conclusions
Acknowledgments
References

Artificial Immune Systems in Intrusion Detection
Dipankar Dasgupta and Fabio Gonzalez
Introduction
Artificial Immune Systems
RNS
Intrusion Detection Problem
Experimentation
Summary
Bibliography

Application of Wavelets in Network Security
Challa S. Sastry and Sanjay Rawat
Introduction
A Brief Introduction to Self-Similarity
A Brief Introduction to Wavelet Analysis
Application of Wavelets
Wavelets for HIDS
Wavelets for Network-Based IDS
Simulation Results
An Observation for Future Work and Conclusion
Appendix
Acknowledgment
References

Application of Exploratory Multivariate Analysis
for Network Security
Khaled Labib and V Rao Vemuri
Abstract
Introduction
The Intrusion Detection Problem
The S Language and Its Environment
Introduction to Multivariate Analysis Methods
DoS and Network Probe Attacks
Data Collection and Preprocessing
Results
Acknowledgment
References
Index



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.