Editore: LAP LAMBERT Academic Publishing Nov 2022, 2022
ISBN 10: 6205516519 ISBN 13: 9786205516515
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 43,90
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results.Books on Demand GmbH, Überseering 33, 22297 Hamburg 64 pp. Englisch.
Editore: LAP LAMBERT Academic Publishing, 2022
ISBN 10: 6205516519 ISBN 13: 9786205516515
Lingua: Inglese
Da: moluna, Greven, Germania
EUR 35,62
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Kaur PrabhjotPrabhjot Kaur is working at Uttaranchal University. She has keen interest in data analysis using ML.Dr. Amit Awasthi is working at University of Petroleum & Energy Studies having more than 15 years of professional experi.
Editore: LAP LAMBERT Academic Publishing Nov 2022, 2022
ISBN 10: 6205516519 ISBN 13: 9786205516515
Lingua: Inglese
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 43,90
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results. 64 pp. Englisch.
Editore: LAP LAMBERT Academic Publishing, 2022
ISBN 10: 6205516519 ISBN 13: 9786205516515
Lingua: Inglese
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 44,59
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results.