Näytä suppeat kuvailutiedot

dc.contributor.authorSipola, Tuomo
dc.contributor.editorLehto, Martti
dc.contributor.editorNeittaanmäki, Pekka
dc.date.accessioned2020-11-23T09:51:53Z
dc.date.available2020-11-23T09:51:53Z
dc.date.issued2015
dc.identifier.citationSipola, T. (2015). Knowledge Discovery from Network Logs. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security: Analytics, Technology and Automation</i> (pp. 195-203). Springer International Publishing. Intelligent Systems, Control and Automation: Science and Engineering, 78. <a href="https://doi.org/10.1007/978-3-319-18302-2_12" target="_blank">https://doi.org/10.1007/978-3-319-18302-2_12</a>
dc.identifier.otherCONVID_24769601
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/72725
dc.description.abstractModern communications networks are complex systems, which facilitates malicious behavior. Dynamic web services are vulnerable to unknown intrusions, but traditional cyber security measures are based on fingerprinting. Anomaly detection differs from fingerprinting in that it finds events that differ from the baseline traffic. The anomaly detection methodology can be modelled with the knowledge discovery process. Knowledge discovery is a high-level term for the whole process of deriving actionable knowledge from databases. This article presents the theory behind this approach, and showcases research that has produced network log analysis tools and methods.fi
dc.format.extent269
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer International Publishing
dc.relation.ispartofCyber Security: Analytics, Technology and Automation
dc.relation.ispartofseriesIntelligent Systems, Control and Automation: Science and Engineering
dc.rightsIn Copyright
dc.subject.othercyber securityfi
dc.titleKnowledge Discovery from Network Logs
dc.typebook part
dc.identifier.urnURN:NBN:fi:jyu-202011236715
dc.contributor.laitosTietotekniikan laitosfi
dc.contributor.laitosDepartment of Mathematical Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.date.updated2020-11-23T07:15:09Z
dc.relation.isbn978-3-319-18301-5
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange195-203
dc.relation.issn2213-8986
dc.relation.numberinseries78
dc.type.versionacceptedVersion
dc.rights.copyright© 2015 Springer
dc.rights.accesslevelopenAccessfi
dc.type.publicationbookPart
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-319-18302-2_12
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright