The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables.
This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.
The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables.
This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.

Machine Learning and Data Mining for Computer Security: Methods and Applications
210
Machine Learning and Data Mining for Computer Security: Methods and Applications
210Product Details
ISBN-13: | 9781849965446 |
---|---|
Publisher: | Springer London |
Publication date: | 12/16/2011 |
Series: | Advanced Information and Knowledge Processing |
Edition description: | 2006 |
Pages: | 210 |
Product dimensions: | 6.10(w) x 9.25(h) x 0.02(d) |