Traffic Anomaly Detection
Autor Antonio Cuadra-Sánchez, Javier Aracilen Limba Engleză Hardback – 29 oct 2015
As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".
- A new information-theory based technique for traffic anomaly detection (typical day analysis)
- Introductory chapters to anomaly detection methods including control charts, tests of goodness-of-fit Mutual Information
- Contains comparative analysis of traffic anomaly detection methods
Preț: 300.71 lei
Preț vechi: 375.89 lei
-20% Nou
Puncte Express: 451
Preț estimativ în valută:
57.54€ • 60.54$ • 47.64£
57.54€ • 60.54$ • 47.64£
Carte tipărită la comandă
Livrare economică 07-21 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781785480126
ISBN-10: 178548012X
Pagini: 70
Ilustrații: black & white illustrations
Dimensiuni: 152 x 229 x 9 mm
Greutate: 0.28 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 178548012X
Pagini: 70
Ilustrații: black & white illustrations
Dimensiuni: 152 x 229 x 9 mm
Greutate: 0.28 kg
Editura: ELSEVIER SCIENCE
Public țintă
Scientific and Engineering communities working on Anomaly detection in the context of Network Security. In particular, early researchers, post-docs and engineers with an interest in this field.Cuprins
1. Theoretical anomaly detection methods. Set of algorithms proposed for this analysis: the most used SCC (CUSUM), the two main tests of goodness-of-fit and Mutual Information.2. Finding the optimal aggregation period for a time series of Internet traffic3. Comparative analysis of traffic anomaly detection methods4. Proposal of a new information-theory based technique (typical day analysis)5. Conclusions
Recenzii
"...their focus is on the theoretical aspects of determining anomalous traffic...it’s bound to be of interest to those developing security solutions." --Network Security