Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
EUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Kaur PrabhjotPrabhjot Kaur is working at Uttaranchal University. She has keen interest in data analysis using ML.Dr. Amit Awasthi is working at University of Petroleum & Energy Studies having more than 15 years of professional experi. Codice articolo 762324448
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results. 64 pp. Englisch. Codice articolo 9786205516515
Quantità: 2 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. Neuware -Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results.Books on Demand GmbH, Überseering 33, 22297 Hamburg 64 pp. Englisch. Codice articolo 9786205516515
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results. Codice articolo 9786205516515
Quantità: 1 disponibili