Status
Rate
List
Check Later
"This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in captured network traffic data to look for anomalous patterns that may correspond to attempts at unauthorized intrusion. The reader will be given a technical and sophisticated description of such algorithms and their applications in the context of intrusion detection in networks"--