TOP
紅利積點抵現金,消費購書更貼心
Machine Learning Algorithms with Feature Reduction Mechanism for Intrusion Detection System

Machine Learning Algorithms with Feature Reduction Mechanism for Intrusion Detection System

商品資訊

定價
:NT$ 1600 元
無庫存,下單後進貨(到貨天數約30-45天)
下單可得紅利積點:48 點
商品簡介

商品簡介

In modern society, the internet-based services are getting too much popularity from last few decads. In today's world, people typically use smartphones, laptops, tablets and other gadgets to access these services at any time, from anywhere. Therefore, data that streams via these networks may contain essential or sensitive information. Moreover, due to advancement of internet technology, the sensitive data is always transmitted between devices and data-warehouse for storing and retrieval purpose. These results open trapdoor for the attackers to launch the widespread of attacks that may be threatend to the organisation and/or the individuals. Attackers use a variety of cutting-edge approaches to take advantage of system security flaws. This might result in the misuse of confidential or delicate information, unauthorised access to the system, or a breach of client accounts. Security professionals and system administrators must employ the advanced security techniques to defend against these threats. Additionally, as new technologies developed for instance big data, IoTs, etc., the vast volumes of traffic or data are also growing, gradually. Therefore, updating the attack signature is getting harder, slower, and more tedious because of the network data traffic expanding significantly. Moreover, searching through such large amounts of data in hunt of relevant or useful evidence is a critical task for data scientists, commercial corporations, and marketers. Hence, network security is presently a rising field of study for scientists and academics because of increased traffic and extensive internet usage. Researchers in these fields (network security) attempt to prevent intrusions or attackers from exploiting system or network vulnerabilities to gain unauthorised entry (s). Although many prevention technologies such as Antivirus, firewalls, etc., for securing a network or system have been developed since last two decades to detect and eliminate potential attacks such as DoS, user to root (U2R), remote to local (R2L), Probe, etc. As a result, fundamental security procedures are needed to identify new kinds of attacks as well as unwanted traffic or data that could harm or disrupt a particular host or network.

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 1600
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區