A word in response to the corona virus crisis: Your print orders will be fulfilled, even in these challenging times. If you don’t want to wait – have a look at our ebook offers and start reading immediately.

Cognitive Intelligence and Robotics

Intrusion Detection

A Data Mining Approach

Authors: Sengupta, Nandita, Sil, Jaya

Free Preview
  • Details dimension reduction techniques, which reduce the complexity of intrusion detection systems without sacrificing prediction accuracy
  • Sheds new light on real-time design of adaptive intrusion detection systems
  • Includes a special chapter on reinforcement learning used for intrusion detection systems and discretization techniques
see more benefits

Buy this book

eBook $109.00
price for USA in USD (gross)
  • ISBN 978-981-15-2716-6
  • Digitally watermarked, DRM-free
  • Included format: PDF, EPUB
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Hardcover $149.99
price for USA in USD
  • ISBN 978-981-15-2715-9
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion.

The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.


About the authors

Nandita Sengupta holds a Bachelor of Engineering degree from the Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India (formerly known as Bengal Engineering College, Shibpur, Calcutta University). She completed a postgraduate management course in Information Technology at IMT, an M.Tech. (Information Technology) and Ph.D. in Engineering (Computer Science and Technology) at IIEST, Shibpur, India. She has worked in the field for 29 years, including 11 years in industry and 18 years teaching IT various subjects. She is currently an Associate Professor at the University College of Bahrain, Bahrain. Her areas of interest are analysis of algorithms, theory of computation, soft computing techniques, network computing and security.

Jaya Sil has been a Professor at the Department of Computer Science and Technology at the Indian Institute of Engineering Science and Technology, Shibpur, since 2003. She completed her B.E. in Electronics and Telecommunication Engineering at B.E. College, at Calcutta University, India, in 1984, and M.E. (Tele) at Jadavpur University, Kolkata, India, in 1986. She received her Ph.D. (Engg) degree in the field of artificial intelligence from Jadavpur University, Kolkata, in 1996, and started her teaching career in 1987 as a lecturer at the Department of Computer Science and Technology at B.E. College, Howrah. She worked as a Postdoctoral Fellow at Nanyang Technological University, Singapore, from 2002 to 2003. She undertook collaborative research in Husar at the Bioinformatics Lab, Heidelberg, Germany, and also visited Wroclaw University of Technology, Poland, in 2012. She was awarded an INSA Senior Scientist Fellowship. Prof. Sil has delivered tutorials and invited talks, and has also presented papers and chaired sessions at various international conferences in abroad and India. She has published more than 200 research papers (including conference papers) in the field of bioinformatics, machine learning and image processing along with applications in a variety of engineering fields. She has published numerous books and several book chapters and acted as a reviewer for IEEE, Elsevier, and Springer Journals.

Table of contents (5 chapters)

Table of contents (5 chapters)

Buy this book

eBook $109.00
price for USA in USD (gross)
  • ISBN 978-981-15-2716-6
  • Digitally watermarked, DRM-free
  • Included format: PDF, EPUB
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Hardcover $149.99
price for USA in USD
  • ISBN 978-981-15-2715-9
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Intrusion Detection
Book Subtitle
A Data Mining Approach
Authors
Series Title
Cognitive Intelligence and Robotics
Copyright
2020
Publisher
Springer Singapore
Copyright Holder
Springer Nature Singapore Pte Ltd.
eBook ISBN
978-981-15-2716-6
DOI
10.1007/978-981-15-2716-6
Hardcover ISBN
978-981-15-2715-9
Series ISSN
2520-1956
Edition Number
1
Number of Pages
XX, 136
Topics