Intrusion detection: a machine learning approach
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Imperial College Press
c2011
|
Schriftenreihe: | Series in electrical and computer engineering
v. 3 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references (p. 159-167) and index Introduction -- Attacks and countermeasures in computer security -- Machine learning methods -- Intrusion detection system -- Intrusion detection for wired network. Techniques for intrusion detection -- Adaptive automatically tuning intrusion detection system -- System prototype and performance evaluation -- Intrusion detection for wireless sensor network. Attacks against wireless sensor network. Intrusion detection system for wireless sensor network. Attacks against wireless sensor network -- Intrusion detection system for wireless sensor network -- Conclusion and future research This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included |
Beschreibung: | 1 Online-Ressource (xii, 171 p.) |
ISBN: | 1848164475 1848164483 9781848164475 9781848164482 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043108745 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2011 |||| o||u| ||||||eng d | ||
020 | |a 1848164475 |9 1-84816-447-5 | ||
020 | |a 1848164483 |c electronic bk. |9 1-84816-448-3 | ||
020 | |a 9781848164475 |9 978-1-84816-447-5 | ||
020 | |a 9781848164482 |c electronic bk. |9 978-1-84816-448-2 | ||
035 | |a (OCoLC)742590401 | ||
035 | |a (DE-599)BVBBV043108745 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Yu, Zhenwei |e Verfasser |4 aut | |
245 | 1 | 0 | |a Intrusion detection |b a machine learning approach |c Zhenwei Yu, Jeffrey J.P. Tsai |
264 | 1 | |a London |b Imperial College Press |c c2011 | |
300 | |a 1 Online-Ressource (xii, 171 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Series in electrical and computer engineering |v v. 3 | |
500 | |a Includes bibliographical references (p. 159-167) and index | ||
500 | |a Introduction -- Attacks and countermeasures in computer security -- Machine learning methods -- Intrusion detection system -- Intrusion detection for wired network. Techniques for intrusion detection -- Adaptive automatically tuning intrusion detection system -- System prototype and performance evaluation -- Intrusion detection for wireless sensor network. Attacks against wireless sensor network. Intrusion detection system for wireless sensor network. Attacks against wireless sensor network -- Intrusion detection system for wireless sensor network -- Conclusion and future research | ||
500 | |a This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Tsai, Jeffrey J.-P. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=373215 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028532936 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=373215 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=373215 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175526033620992 |
---|---|
any_adam_object | |
author | Yu, Zhenwei |
author_facet | Yu, Zhenwei |
author_role | aut |
author_sort | Yu, Zhenwei |
author_variant | z y zy |
building | Verbundindex |
bvnumber | BV043108745 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)742590401 (DE-599)BVBBV043108745 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03205nmm a2200517zcb4500</leader><controlfield tag="001">BV043108745</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1848164475</subfield><subfield code="9">1-84816-447-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1848164483</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84816-448-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781848164475</subfield><subfield code="9">978-1-84816-447-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781848164482</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84816-448-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)742590401</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043108745</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yu, Zhenwei</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intrusion detection</subfield><subfield code="b">a machine learning approach</subfield><subfield code="c">Zhenwei Yu, Jeffrey J.P. Tsai</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Imperial College Press</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 171 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Series in electrical and computer engineering</subfield><subfield code="v">v. 3</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 159-167) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- Attacks and countermeasures in computer security -- Machine learning methods -- Intrusion detection system -- Intrusion detection for wired network. Techniques for intrusion detection -- Adaptive automatically tuning intrusion detection system -- System prototype and performance evaluation -- Intrusion detection for wireless sensor network. Attacks against wireless sensor network. Intrusion detection system for wireless sensor network. Attacks against wireless sensor network -- Intrusion detection system for wireless sensor network -- Conclusion and future research</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsai, Jeffrey J.-P.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=373215</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028532936</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=373215</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=373215</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043108745 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:41Z |
institution | BVB |
isbn | 1848164475 1848164483 9781848164475 9781848164482 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028532936 |
oclc_num | 742590401 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xii, 171 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Imperial College Press |
record_format | marc |
series2 | Series in electrical and computer engineering |
spelling | Yu, Zhenwei Verfasser aut Intrusion detection a machine learning approach Zhenwei Yu, Jeffrey J.P. Tsai London Imperial College Press c2011 1 Online-Ressource (xii, 171 p.) txt rdacontent c rdamedia cr rdacarrier Series in electrical and computer engineering v. 3 Includes bibliographical references (p. 159-167) and index Introduction -- Attacks and countermeasures in computer security -- Machine learning methods -- Intrusion detection system -- Intrusion detection for wired network. Techniques for intrusion detection -- Adaptive automatically tuning intrusion detection system -- System prototype and performance evaluation -- Intrusion detection for wireless sensor network. Attacks against wireless sensor network. Intrusion detection system for wireless sensor network. Attacks against wireless sensor network -- Intrusion detection system for wireless sensor network -- Conclusion and future research This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks Security measures Computer security Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 s 1\p DE-604 Tsai, Jeffrey J.-P. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=373215 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Yu, Zhenwei Intrusion detection a machine learning approach COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks Security measures Computer security Eindringerkennung (DE-588)4706627-1 gnd |
subject_GND | (DE-588)4706627-1 |
title | Intrusion detection a machine learning approach |
title_auth | Intrusion detection a machine learning approach |
title_exact_search | Intrusion detection a machine learning approach |
title_full | Intrusion detection a machine learning approach Zhenwei Yu, Jeffrey J.P. Tsai |
title_fullStr | Intrusion detection a machine learning approach Zhenwei Yu, Jeffrey J.P. Tsai |
title_full_unstemmed | Intrusion detection a machine learning approach Zhenwei Yu, Jeffrey J.P. Tsai |
title_short | Intrusion detection |
title_sort | intrusion detection a machine learning approach |
title_sub | a machine learning approach |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks Security measures Computer security Eindringerkennung (DE-588)4706627-1 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks Security measures Computer security Eindringerkennung |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=373215 |
work_keys_str_mv | AT yuzhenwei intrusiondetectionamachinelearningapproach AT tsaijeffreyjp intrusiondetectionamachinelearningapproach |