MACHINE LEARNING FOR CYBER SECURITY DETECTING ANOMALIES AND INSTRUSIONS

· · ·
· Xoffencerpublication
Ebook
199
Pages
Ratings and reviews aren’t verified  Learn More

About this ebook

Because the Internet is so widespread in modern life and because of the expansion of technologies that are tied to it, such as smart cities, self-driving cars, health monitoring via wearables, and mobile banking, a growing number of people are becoming reliant on and addicted to the Internet. In spite of the fact that these technologies provide a great deal of improvement to individuals and communities, they are not without their fair share of concerns. By way of illustration, hackers have the ability to steal from or disrupt companies, therefore inflicting damage to people all across the world, if they exploit weaknesses. As a consequence of cyberattacks, businesses can face financial losses as well as damage to their reputation. Consequently, the security of the network has become a significant concern as a result. Organizations place a significant amount of reliance on tried-and-true technologies such as firewalls, encryption, and antivirus software when it comes to securing their network infrastructure. Unfortunately, these solutions are not completely infallible; they are merely a first line of security against malware and other sophisticated threats. Therefore, it is possible that certain persons who have not been sanctioned may still get access, which might result in a breach of security. For the purpose of preventing intrusion detection, computer systems need to be safeguarded against both illegal users, such as hackers, and legitimate users, such as insiders. A breach of a computer system may result in a number of undesirable results, including the loss of data, restricted access to internet services, the loss of sensitive data, and the exploitation of private resources. an initial version of the Intrusion Detection System (IDS) was constructed. In light of the fact that it is a that is essential for the protection of computer networks, it has therefore become a subject of study that is widely pursued. Given the current condition of cybercrime, it is impossible to deny the significance of the intrusion detection system (IDS). A possible example of how the IDS taxonomy is arranged may be found here. The intrusion detection system, often known as an IDS, is a piece of software or hardware that monitors a computer or network environment, searches for indications of intrusion, and then notifies the user of any potential threats. Utilizing this warning report is something that the administrator or user may do in order to repair the vulnerability that exists inside the system or network. In the aftermath of an intrusion, it may be purposeful or unlawful to attempt to access the data

About the author

Manoj Ram Tammina MD, MBA has research and development roles involving some combination of NLP, deep learning, reinforcement learning, computer vision, and predictive modeling. He is actively leading team of data scientists, ML researchers and engineers, taking research across full machine learning life cycle - data access, infrastructure, model R&D, systems design and deployment

Vikas Raina is presently Associate Professor, Department of Computer Science Engineering, School of Engineering and Technology, Mody University of Science and Technology, Lakshmangarh, Sikar, Rajasthan-a NAAC A+ awarded University. He obtained his PhD Degree from School of Engineering and Technology. Mody University of Science and Technology in 2018. He has published numerous research papers in reputed ESCI, WoS and SCOPUS Indexed International journals. He has published one patent, book and granted one patent

Aditya Mahamkali an accomplished Associate at Goldman Sachs, is a trailblazer in the field of computer science. With a solid academic foundation from the prestigious Virginia International University and currently pursuing a Doctor of Information Technology degree at the University of Cumberlands, Aditya's relentless pursuit of knowledge is evident. His passion for research and innovation is showcased through the publication of four impactful papers, including two research papers and one review paper, all of which have received the prestigious Best Paper award. Aditya's commitment to pushing the boundaries of computer science is further demonstrated by his active engagement with industry experts at an esteemed International Conference in Singapore. As a member of ISSCA Dallas (ISACA ID 1921326), Aditya not only excels in his professional endeavors but also inspires colleagues and peers with exceptional leadership skills, fostering an environment of innovation and continuous learning. His unwavering commitment and intellectual prowess make him a beacon of inspiration within his community. At Goldman Sachs, Aditya's leadership skills contribute to the company's success and drive the development of cutting-edge IoT products and services, pushing technological x boundaries and delighting clients. Aditya Mahamkali is a true visionary in the world of computer science, leaving an indelible mark on the industry

Arijeet Chandra Sen MTech (Software Systems), MSc, B.Tech. & having over 17 years’ professional work experience in a wide gamut of functional areas of Communication Technologies, Information Technology, Critical Infrastructure Development, Risk assessment and management, Cyber Security, AI and other emerging niche technologies. Currently working with Government of India and holding multiple Indian and foreign pending patents. A keen researcher with sound exposure to emerging trends and happenings in the Cyber Security, AI and Data Science Fields.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.