Download now Free registration required
Every hacker in the world is one's neighbor on the Internet, which results in attack defense and detection being pervasive both at home and work. Although hundreds of papers have been written on a large variety of methods of intrusion detection - from log analysis, to packet analysis, statistics, data mining, and sophisticated computational intelligence methods - and even though similar data structures are used by the various types of intrusion analysis, apparently little has been published on a methodical mathematical description of how data is manipulated and perceived in network intrusion detection from binary network packets to more manageable data structures such as vectors and matrices.
- Format: PDF
- Size: 418.25 KB