Machine Learning and Data Mining for Computer Security Methods and Applications /
The Internet began as a private network connecting government, military, and academic researchers. As such, there was little need for secure protocols, encrypted packets, and hardened servers. When the creation of the World Wide Web unexpectedly ushered in the age of the commercial Internet, the net...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
London :
Springer London,
2006.
|
Series: | Advanced Information and Knowledge Processing
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Survey Contributions
- An Introduction to Information Assurance
- Some Basic Concept of Machine Learning and Data Mining
- Research Contributions
- Learning to Detect Malicious Executables
- Data Mining Applied to Intrusion Detection: MITRE Experiences
- Intrusion Detection Alarm Clustering
- Behavioral Features for Network Anomaly Detection
- Cost-Sensitive Modeling for Intrusion Detection
- Data Cleaning and Enriched Representations for Anomaly Detection in System Calls
- A Decision-Theoritic, Semi-Supervised Model for Intrusion Detection.