August 2019
Intermediate to advanced
342 pages
9h 35m
English
As we saw in Chapter 5, Network Anomaly Detection with AI, one of the areas in which ML has proved particularly useful is that of anomaly detection. However, even in the case of anomaly detection, the adoption of AI-based cybersecurity solutions must be carefully evaluated in light of the challenges that the complexity of these solutions inevitably introduces.
In particular, the possible negative impact, both on the business and on the security of the errors originating from the anomaly detection systems, induced by both false positives and false negatives, must be carefully evaluated.
As we know, there is usually a trade-off between false positives and false negatives; therefore, attempting to reduce the ...
Read now
Unlock full access