Amazon cover image
Image from Amazon.com

Intrusion Detection [electronic resource] : A Data Mining Approach /

By: Contributor(s): Material type: TextTextSeries: Cognitive Intelligence and RoboticsPublisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2020Edition: 1st ed. 2020Description: XX, 136 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789811527166
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 004.6 23
LOC classification:
  • TK5105.5-5105.9
Online resources:
Contents:
Chapter 1. Introduction -- Chapter 2. Discretization -- Chapter 3. Data Reduction -- Chapter 4. Q-Learning Classifiers -- Chapter 5. Hierarchical Q - Learning Classifier -- Chapter 6. Conclusions and Future Research.
In: Springer Nature eBookSummary: This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Chapter 1. Introduction -- Chapter 2. Discretization -- Chapter 3. Data Reduction -- Chapter 4. Q-Learning Classifiers -- Chapter 5. Hierarchical Q - Learning Classifier -- Chapter 6. Conclusions and Future Research.

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in