Effective Intrusion Detection using Feature Selection: A Machine Learning based Approach by Gulshan Kumar, PDF 3659633372

Effective Intrusion Detection using Feature Selection: A Machine Learning based Approach

  • Title: Effective Intrusion Detection using Feature Selection: A Machine Learning based Approach
  • Autor: Gulshan Kumar
  • Publisher (Publication Date): LAP LAMBERT Academic Publishing (November 4, 2014)
  • Language: English
  • ISBN-10: | 3659633372
  • ISBN-13: | 978-3659633379
  • File Format: EPUB, PDF

 
Internet security is a serious concern in the present era. There is an enormous growth of the Internet in terms of its usage and resources. Almost all major organizations, educational institutes, governments and individuals are dependent upon the Internet for providing their services. Therefore, smooth running of the Internet and maintaining integrity & confidentiality of the sensitive information over the Internet is the most important aspect of the growth of the information based organizations. However, presence of flaws in the most popular software provides numerous chances for malicious users to mount a variety of attacks to disrupt services and integrity of sensitive information over the Internet. Thus, the security of the Internet resources has become a very serious issue and a global concern for the governments, commercial organizations and individuals. Moreover, due to the advancement of computers, the behavior of intrusions has become more complex. Machine learning techniques have evolved as a promising solution. However, performance is affected due presence of a large number of redundant and irrelevant features. Feature selection helps to identify most relevant features.

No reviews

Comments:


Related posts

92 Applied Predictive Modeling Techniques in R: With step by step instructions on how to build them FAST! by Dr. N D Lewis, PDF
Assembly Language Programming Made Clear: A Systemic Approach by Howard Dachslager, PDF 151651422X
Active Directory System Manager Information Technology by Qusay Kanaan Kadhim, PDF 3330046082
Shelly Cashman Series Microsoft Office 365 & Office 2016: Brief by Misty E. Vermaat, PDF 1305870050
Reactive Design Patterns by Jamie Allen, PDF 1617291803
An Agent-Based Model of a Responsive Network Monitoring System by William Okello-Odongo, PDF 3659948802

Leave a Reply

Your email address will not be published. Required fields are marked *