Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools /

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Bhuyan, Monowar H. (Συγγραφέας), Bhattacharyya, Dhruba K. (Συγγραφέας), Kalita, Jugal K. (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2017.
Σειρά:Computer Communications and Networks,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04527nam a22005295i 4500
001 978-3-319-65188-0
003 DE-He213
005 20170904172405.0
007 cr nn 008mamaa
008 170904s2017 gw | s |||| 0|eng d
020 |a 9783319651880  |9 978-3-319-65188-0 
024 7 |a 10.1007/978-3-319-65188-0  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
100 1 |a Bhuyan, Monowar H.  |e author. 
245 1 0 |a Network Traffic Anomaly Detection and Prevention  |h [electronic resource] :  |b Concepts, Techniques, and Tools /  |c by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XXII, 263 p. 98 illus., 9 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Computer Communications and Networks,  |x 1617-7975 
505 0 |a Introduction -- Networks and Network Traffic Anomalies -- A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets -- Network Traffic Anomaly Detection Techniques and Systems -- Alert Management and Anomaly Prevention Techniques -- Practical Tools for Attackers and Defenders -- Evaluation Criteria -- Open Issues, Challenges and Conclusion. 
520 |a This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: Introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks Describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets Provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners Examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing Presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools Discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality Reviews open issues and challenges in network traffic anomaly detection and prevention This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference. Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA. 
650 0 |a Computer science. 
650 0 |a Computer software  |x Reusability. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Electrical engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Performance and Reliability. 
650 2 4 |a Communications Engineering, Networks. 
700 1 |a Bhattacharyya, Dhruba K.  |e author. 
700 1 |a Kalita, Jugal K.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319651866 
830 0 |a Computer Communications and Networks,  |x 1617-7975 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-65188-0  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)