Inicio > Tecnología, ingeniería, agricultura > Tecnología: cuestiones generales > Network Intrusion Detection System Using Spark’s Scalable Machine Learning Library
Network Intrusion Detection System Using Spark’s Scalable Machine Learning Library

Network Intrusion Detection System Using Spark’s Scalable Machine Learning Library

Pradeep Laxkar

35,59 €
IVA incluido
Consulta disponibilidad
Editorial:
Draft2Digital
Año de edición:
2024
Materia
Tecnología: cuestiones generales
ISBN:
9798224363322

Selecciona una librería:

  • Librería Perelló (Valencia)
  • Librería Aciertas (Toledo)
  • El AlmaZen del Alquimista (Sevilla)
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Donde los libros
  • Librería Proteo (Málaga)

An intrusion detection system (IDS) is a hardware component, application utility software or a combination of both types which includes monitoring a computer system associated with a specific network or computer systems for malevolent activity or policy discriminations. From the observation of IDS such detected activity or infiltration is typically reported earlier to a system administrator for further action. Bijone(2016) An IDS performs various functions like monitoring of clients and system actions , identification of inconsistent occurrence using statistical analysis and also recognizing identified attack blueprints in system activity , while improvement of system configuration mistakes establishing and working traps to documentation information about intruders auditing system design for exposures and misconfigurations managing audit trails and stressing user misdemeanor of rules or normal activity measuring the wholeness of vital system and data files. We can Kruegel et al. (2005) distinguish an intrusion in terms of secrecy, integrity, and accessibility. Any event or action causes a violation of secrecy if it is allowed to access resources like memory of printing resources which are connected to a computer in some prohibited act. In the same way an incident or act causes a violate of accessibility if it forbids authentic users to access resources or services residing in a computer.

Artículos relacionados

  • Science and the Big Issues of Our Time
    Martin Gellender
    Within the last few generations, our world has been shaped by technological change enabled by scientific advances. This is particularly evident to the 'baby boomer' generation, who have lived through and witnessed huge changes in society over the course of their lifetimes. Although many have little education in science, or have forgotten what they learned in high school, they u...
    Disponible

    26,58 €

  • Statics+++
    James W Dally / Robert J Bonenberger
    This textbook has been prepared to support a course offering for Statics at the University of Nevada at Reno.  Statics provides the first exposure of engineering students to the study of mechanics.  While Statics is a relatively simple subject, many students find it difficult, and they often perform far below our expectations.  In an effort to improve the curriculum, several me...
    Disponible

    101,22 €

  • Technical Writing, Presentational Skills, and Online Communication
    Raymond Greenlaw
    This book addresses four main topics: professional ethics, technical writing, presentation skills, and online writing. These topics are woven throughout the book and some of them are the main subjects of one or more chapters. The overarching theme of this book is to provide well-tested, best-practice techniques and strategies for main topic areas while focusing on information t...
    Disponible

    229,44 €

  • Project Management Techniques and Innovations in Information Technology
    John Wang
    Managing cost, time, and quality of a project can be a challenging task for any project manager, but especially in times of an ever-changing and burgeoning field of IT. Project Management Techniques and Innovations in Information Technology offers a vital compendium of the latest research, case studies, best practices, and methodologies within the field of IT project management...
    Disponible

    229,98 €

  • Phenomenology, Organizational Politics, and IT Design
    Information systems are researched, published on, and utilized as an extremely broad and vital sector of current technology development, usually studied from the scientific or technological viewpoints therein. Phenomenology, Organizational Politics, and IT Design: The Social Study of Information Systems offers a new look at the latest research and critical issues within the fie...
    Disponible

    230,06 €

  • Geotechnical Applications for Earthquake Engineering
    Disaster preparedness and response management is a burgeoning field of technological research, and staying abreast of the latest developments within the field is a difficult task. Geotechnical Applications for Earthquake Engineering: Research Advancements has collected chapters from experts from around the world in a variety of applications, frameworks, and methodologies, and p...
    Disponible

    236,13 €

Otros libros del autor

  • Intrusion Detection System mit SPARK’S Machine Learning Bibliothek
    Pradeep Laxkar
    Heutzutage spielen die Sicherheitsprobleme von Computernetzwerken eine zentrale Rolle. Das Netz ist anfällig für Angriffe wie DOS, U2R, R2L usw. Diese Angriffe nutzen eine Schwachstelle im Netzwerk aus, um sich illegal Zugang zu wichtigen Informationen zu verschaffen oder manchmal eine Flut von Daten zu erzeugen, um echte Benutzer am Zugang zu hindern. Netzwerkangreifer nutzen ...
    Disponible

    77,56 €

  • Système de détection d’intrusion utilisant la bibliothèque d’apprentissage automatique de Springer
    Pradeep Laxkar
    De nos jours, les problèmes de sécurité des réseaux informatiques jouent un rôle central. Le réseau est vulnérable aux attaques telles que DOS, U2R, R2L, etc. Ces attaques profitent d’une vulnérabilité du réseau pour accéder illégalement à des informations importantes ou parfois pour créer une inondation afin d’empêcher les véritables utilisateurs d’y accéder. Les attaquants ut...
    Disponible

    77,56 €

  • Sistema di rilevamento delle intrusioni con la libreria di apprendimento automatico SPARK
    Pradeep Laxkar
    Oggigiorno i problemi di sicurezza delle reti informatiche giocano un ruolo fondamentale. La rete è vulnerabile ad attacchi come DOS, U2R, R2L ecc. Questi attacchi sfruttano la vulnerabilità della rete per ottenere l’accesso illegale a informazioni importanti o, talvolta, per creare un’inondazione che impedisca agli utenti autentici di accedervi. Gli aggressori di rete utilizza...
    Disponible

    77,56 €

  • Sistema de detecção de intrusão usando a biblioteca de aprendizagem de máquinas da Spiark
    Pradeep Laxkar
    Agora os problemas de segurança de redes informáticas de um dia desempenham um papel fulcral. A rede é vulnerável a ataques como o DOS, U2R, R2L, etc. Estes ataques aproveitam a vulnerabilidade da rede para obter acesso ilegal a informação importante ou, por vezes, criam uma inundação para impedir que os utilizadores genuínos acedam à mesma. Os atacantes da rede utilizam um vol...
    Disponible

    77,56 €