Vemuri | Enhancing Computer Security with Smart Technology | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 288 Seiten

Vemuri Enhancing Computer Security with Smart Technology


Erscheinungsjahr 2005
ISBN: 978-1-4200-3122-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 288 Seiten

ISBN: 978-1-4200-3122-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.

Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security.

A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance.

Vemuri Enhancing Computer Security with Smart Technology jetzt bestellen!

Zielgruppe


IT security managers, CISOs, Computer Science and AI students and professionals


Autoren/Hrsg.


Weitere Infos & Material


Cyber-Security and Cyber-Trust

V Rao Vemuri
Introduction

Cyber-Security
Cyber-Trust
What the Future Holds

Network Firewalls

Kenneth Ingham and Stephanie Forrest
Abstract

Introduction

The Need for Firewalls
Firewall Architectures

Firewalls at Various ISO Network Layers
Other Approaches

Firewall Testing

What Firewalls Do Not Protect Against
Future Challenges for Firewalls

Conclusion

References

Web Application Security: The Next Battleground
Abhishek Kumar, Roshen Chandran, and Vinod Vasudevan
Threats to Web Applications

Vulnerabilities in Web Applications
Attack Techniques

Preventing Vulnerabilities in Web Applications
Conclusion

Notes

References

Relevance of Machine Learning
V Rao Vemuri
Introduction

Place of Intrusion Detection in the Security Landscape
Machine Learning beyond Intrusion Detection

Machine Learning and Computational Learning Theory

Some Popular Machine Learning Methods
Making Machine Learning More Useful

Summary

References

Machine Learning in Intrusion Detection

Yihua Liao and V Rao Vemuri
Introduction

Intrusion Detection

Machine Learning Approaches to Anomaly Detection

Audit Data.
Issues in Anomaly Detection

Open Questions and Future Directions
Illustrative Example: Adaptive Anomaly Detection

Summary

References

Cyber-Security Challenges: Designing Efficient
Intrusion Detection Systems and Anti-Virus Tools

Srinivas Mukkamala, Andrew Sung, and Ajith Abraham
Introduction to IDSs
A Review on IDSs
Computer Attack Taxonomy

Significant Feature Selection for Intrusion Detection
Detection of Probes and DoS Attacks
Attacks on IDSs

Attacks on Anti-Virus Tools
Conclusions
Acknowledgments
References

Artificial Immune Systems in Intrusion Detection
Dipankar Dasgupta and Fabio Gonzalez
Introduction

Artificial Immune Systems

RNS
Intrusion Detection Problem

Experimentation
Summary

Bibliography

Application of Wavelets in Network Security
Challa S. Sastry and Sanjay Rawat
Introduction

A Brief Introduction to Self-Similarity

A Brief Introduction to Wavelet Analysis
Application of Wavelets

Wavelets for HIDS
Wavelets for Network-Based IDS
Simulation Results

An Observation for Future Work and Conclusion

Appendix

Acknowledgment

References

Application of Exploratory Multivariate Analysis
for Network Security
Khaled Labib and V Rao Vemuri
Abstract

Introduction

The Intrusion Detection Problem

The S Language and Its Environment
Introduction to Multivariate Analysis Methods
DoS and Network Probe Attacks
Data Collection and Preprocessing
Results

Acknowledgment

References
Index



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.