下载 >  开发技术 >  C++ > Machine Learning and Data Mining for Computer Security

Machine Learning and Data Mining for Computer Security

2009-09-05 上传大小:2.85MB
Intrusion detection and analysis has received a lot of criticism and publicity over the last several years. The Gartner report took a shot saying Intrusion Detection Systems are dead, while others believe Intrusion Detection is just reaching its maturity. The problem that few want to admit is that the current public methods of intrusion detection, while they might be mature, based solely on the fact they have been around for a while, are not extremely sophisticated and do not work very well. While there is no such thing as 100% 
                            security, people always expect a technology to accomplish more than it currently does, and this is clearly the case with intrusion detection. It needs to be taken to the next level with more advanced analysis being done by the computer and less by the human. The current area of Intrusion Detection is begging for Machine Learning to be applied to it. Convergence of these two key areas is critical for it to be taken to the next level. The problem is that I have seen little research focusing on this, until now. After reading Machine Learning and Data Mining for Computer Security, I feel Dr Maloof has hit the target dead centre. While much research has been done across Computer Security independently and Machine Learning independently, for some reason no one wanted to cross-breed the two topics. Dr Maloof not only did a masterful job of focusing the book on a critical area that was in dire need of research, but he also strategically picked papers that complemented each other in a productive manner. Usually reading an edited volume like this, the chapters are very disjointed with no connection between them. While these chapters cover different areas of research, there is a hidden flow that complements the previous chapter with the next. While Dr Maloof points out in his Preface the intended audience, I feel that there are two additional critical groups. Firstly, I feel that any vendor or solution provider that is looking to provide a competitive advantage for their product should read this book and see exactly what the potential of next generation intrusion detection can provide. Secondly, I feel that any Computer Science student should read this book to understand the power of convergence across technologies. Everyone is searching for new solutions to intrusion detection within Computer Science and more specifically within Computer Security. But until they are willing to take a step back and provide insight and knowledge from another domain, like Dr Maloof has done, they will not find suitable answers. This book is a must read for anyone interested in how research can improve computer security It also provides insight into additional areas of research that can be pursued. The criteria to measure a book like this is: ‘Does it get you thinking and does it nurture the creative juices from within?’ The short answer is absolutely. After reading this book, I was writing down several additional areas that I wanted to research and pursue as follow-on to reading this book. That is a key mark of a valuable book! Dr Eric Cole, Computer Security Expert                        
...展开收缩
综合评分:4
开通VIP 立即下载

评论共有4条

zyc1314zyc 2017-11-02 22:07:21
为什么下载的不对啊?带我看看
jeniffer_yang 2017-09-22 10:25:08
数据挖掘和机器学习在计算机安全方面的应用,值得一看。非常感谢
briskywind 2014-03-24 16:50:47
从机器学习的视角进行安全分析,但是机器学习的深度不够
 
Data Mining and Machine Learning in Cybersecurity 立即下载
积分/C币:12
Machine Learning and Data Mining Methods in Diabetes Research.pdf 立即下载
积分/C币:3
数据挖掘实用机器学习技术 Data Mining Practical Machine Learning Tools and Techniques 4ed 立即下载
积分/C币:18
Statistics Data Mining and Machine Learning in Astronomy 无水印pdf 立即下载
积分/C币:10
Encyclopedia of Machine Learning and Data Mining(2nd) 无水印pdf 立即下载
积分/C币:12
Encyclopedia of Machine Learning and Data Mining 2nd.Edition.pdf 立即下载
积分/C币:10
Statistics, Data Mining, and Machine Learning in Astronomy (astroML) 立即下载
积分/C币:20
Learning Data Mining with Python - Second Edition 立即下载
积分/C币:5
Principles and Theory for Data Mining and Machine Learning 立即下载
积分/C币:10
Hands-On Data Science and Python Machine Learning 立即下载
积分/C币:3

VIP会员动态

0 1 2
关闭
img

spring mvc+mybatis+mysql+maven+bootstrap 整合实现增删查改简单实例.zip

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
点击完成任务获取下载码
输入下载码
为了良好体验,不建议使用迅雷下载
img

Machine Learning and Data Mining for Computer Security

会员到期时间: 剩余下载个数: 剩余C币: 剩余积分:0
为了良好体验,不建议使用迅雷下载
VIP下载
您今日下载次数已达上限(为了良好下载体验及使用,每位用户24小时之内最多可下载20个资源)

积分不足!

资源所需积分/C币 当前拥有积分
您可以选择
开通VIP
4000万
程序员的必选
600万
绿色安全资源
现在开通
立省522元
或者
购买C币兑换积分 C币抽奖
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
为了良好体验,不建议使用迅雷下载
确认下载
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
为了良好体验,不建议使用迅雷下载
开通VIP
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
您的积分不足,将扣除 10 C币
为了良好体验,不建议使用迅雷下载
确认下载
下载
无法举报自己的资源

兑换成功

你当前的下载分为234开始下载资源
你还不是VIP会员
开通VIP会员权限,免积分下载
立即开通

你下载资源过于频繁,请输入验证码

您因违反CSDN下载频道规则而被锁定帐户,如有疑问,请联络:webmaster@csdn.net!

举报

若举报审核通过,可返还被扣除的积分

  • 举报人:
  • 被举报人:
  • 举报的资源分:
  • *类型:
  • *详细原因: