55,10 €*
Versandkostenfrei per Post / DHL
Lieferzeit 4-7 Werktage
Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools; discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality; reviews open issues and challenges in network traffic anomaly detection and prevention.
This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.
Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools; discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality; reviews open issues and challenges in network traffic anomaly detection and prevention.
This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.
Provides a thorough introduction to network attacks, describes the pros and cons of various data mining approaches, and discusses important issues and challenges to be addressed
Presents a systematic, hands-on approach to generating real-life large intrusion datasets
Contains lists of practical tools and systems, together with hands-on examples for launching, monitoring, detecting, and preventing various types of network attacks
Networks and Network Traffic Anomalies
A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets
Network Traffic Anomaly Detection Techniques and Systems
Alert Management and Anomaly Prevention Techniques
Practical Tools for Attackers and Defenders
Evaluation Criteria
Open Issues, Challenges and Conclusion
Erscheinungsjahr: | 2018 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Seiten: | 288 |
Reihe: | Computer Communications and Networks |
Inhalt: |
xxii
263 S. 89 s/w Illustr. 9 farbige Illustr. 263 p. 98 illus. 9 illus. in color. |
ISBN-13: | 9783319879680 |
ISBN-10: | 3319879685 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Bhuyan, Monowar H.
Kalita, Jugal K. Bhattacharyya, Dhruba K. |
Auflage: | Softcover reprint of the original 1st ed. 2017 |
Hersteller: |
Springer International Publishing
Computer Communications and Networks |
Maße: | 235 x 155 x 15 mm |
Von/Mit: | Monowar H. Bhuyan (u. a.) |
Erscheinungsdatum: | 12.08.2018 |
Gewicht: | 0,493 kg |
Provides a thorough introduction to network attacks, describes the pros and cons of various data mining approaches, and discusses important issues and challenges to be addressed
Presents a systematic, hands-on approach to generating real-life large intrusion datasets
Contains lists of practical tools and systems, together with hands-on examples for launching, monitoring, detecting, and preventing various types of network attacks
Networks and Network Traffic Anomalies
A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets
Network Traffic Anomaly Detection Techniques and Systems
Alert Management and Anomaly Prevention Techniques
Practical Tools for Attackers and Defenders
Evaluation Criteria
Open Issues, Challenges and Conclusion
Erscheinungsjahr: | 2018 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Seiten: | 288 |
Reihe: | Computer Communications and Networks |
Inhalt: |
xxii
263 S. 89 s/w Illustr. 9 farbige Illustr. 263 p. 98 illus. 9 illus. in color. |
ISBN-13: | 9783319879680 |
ISBN-10: | 3319879685 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Bhuyan, Monowar H.
Kalita, Jugal K. Bhattacharyya, Dhruba K. |
Auflage: | Softcover reprint of the original 1st ed. 2017 |
Hersteller: |
Springer International Publishing
Computer Communications and Networks |
Maße: | 235 x 155 x 15 mm |
Von/Mit: | Monowar H. Bhuyan (u. a.) |
Erscheinungsdatum: | 12.08.2018 |
Gewicht: | 0,493 kg |