Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results.
"synopsis" may belong to another edition of this title.
£ 9.20 shipping from Germany to United Kingdom
Destination, rates & speedsSeller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results. 64 pp. Englisch. Seller Inventory # 9786205516515
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results. Seller Inventory # 9786205516515
Quantity: 1 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Kaur PrabhjotPrabhjot Kaur is working at Uttaranchal University. She has keen interest in data analysis using ML.Dr. Amit Awasthi is working at University of Petroleum & Energy Studies having more than 15 years of professional experi. Seller Inventory # 762324448
Quantity: Over 20 available
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -Network forensics helps in tracking down cyber fraudsters by assessing and tracing back network data. The use of various network traffic gathering tools is required. Network forensics is analyzing network traffic to detect intrusions and studying how the crime occurred, i.e., establishing a crime scene for investigation and replays. This study proposes a general network forensic process model and architecture. A secondary data set, KDD CUP of normal and anomalous traffic is used for analysis to simulate the entire process. The dataset is largely processed for feature selection and redundancy removal. The dataset was cleaned before being analyzed using the Support Vector Machine learning model to classify the traffic. The multiclass classification has been used to categorize various types of network attacks. The accuracy of the model is then evaluated using the obtained results.Books on Demand GmbH, Überseering 33, 22297 Hamburg 64 pp. Englisch. Seller Inventory # 9786205516515
Quantity: 2 available