Cantitate/Preț
Produs

Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools: Computer Communications and Networks

Autor Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
en Limba Engleză Hardback – 19 sep 2017
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information.Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools; discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality; reviews open issues and challenges in network traffic anomaly detection and prevention. This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 35658 lei  38-44 zile
  Springer International Publishing – 12 aug 2018 35658 lei  38-44 zile
Hardback (1) 80900 lei  38-44 zile
  Springer International Publishing – 19 sep 2017 80900 lei  38-44 zile

Din seria Computer Communications and Networks

Preț: 80900 lei

Preț vechi: 101126 lei
-20% Nou

Puncte Express: 1214

Preț estimativ în valută:
15487 15928$ 12848£

Carte tipărită la comandă

Livrare economică 12-18 februarie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319651866
ISBN-10: 3319651862
Pagini: 263
Ilustrații: XXII, 263 p. 98 illus., 9 illus. in color.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 5.55 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seria Computer Communications and Networks

Locul publicării:Cham, Switzerland

Cuprins

Introduction.- Networks and Network Traffic Anomalies.- A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets.- Network Traffic Anomaly Detection Techniques and Systems.- Alert Management and Anomaly Prevention Techniques.- Practical Tools for Attackers and Defenders.- Evaluation Criteria.- Open Issues, Challenges and Conclusion.

Notă biografică

Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.

Textul de pe ultima copertă

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information.Topics and features:

  • Introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks
  • Describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets
  • Provides a detailed study of network anomaly detectiontechniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners
  • Examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing
  • Presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools
  • Discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality
  • Reviews open issues and challenges in network traffic anomaly detection and prevention
This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.
Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.

Caracteristici

Provides a thorough introduction to network attacks, describes the pros and cons of various data mining approaches, and discusses important issues and challenges to be addressed Presents a systematic, hands-on approach to generating real-life large intrusion datasets Contains lists of practical tools and systems, together with hands-on examples for launching, monitoring, detecting, and preventing various types of network attacks