Comparison of machine learning algorithms to build optimized network intrusion detection system
H Parveen Sultana, N Shrivastava… - Journal of …, 2019 - ingentaconnect.com
Journal of Computational and Theoretical Nanoscience, 2019•ingentaconnect.com
Network Security is the most important aspect for all products and services offered by
networking systems. The network density and usage in information systems, technical
systems are humungous and is used by the entire world to provide connectivity from busiest
hours to remote locations. Mission critical events, governmental organizations, information
technology structures rely on continuous and smooth provision of network connection. This
makes the basis of information security pillars—Confidentiality, which means that the data …
networking systems. The network density and usage in information systems, technical
systems are humungous and is used by the entire world to provide connectivity from busiest
hours to remote locations. Mission critical events, governmental organizations, information
technology structures rely on continuous and smooth provision of network connection. This
makes the basis of information security pillars—Confidentiality, which means that the data …
Network Security is the most important aspect for all products and services offered by networking systems. The network density and usage in information systems, technical systems are humungous and is used by the entire world to provide connectivity from busiest hours to remote locations. Mission critical events, governmental organizations, information technology structures rely on continuous and smooth provision of network connection. This makes the basis of information security pillars—Confidentiality, which means that the data transferred between two users can be readable but should not be understandable, meaning it should be encrypted; Integrity, which focuses on the aspect of reliable message transfer preventing any kind of message tampering in the data transfer process; and finally Authentication and Availability, meaning that the user sending and receiving the data are genuine, and that the data is available, free from denial attacks.
ingentaconnect.com
以上显示的是最相近的搜索结果。 查看全部搜索结果