Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Encrypted network traffic analysis
~
Cherukuri, Aswani Kumar.
Linked to FindBook
Google Book
Amazon
博客來
Encrypted network traffic analysis
Record Type:
Electronic resources : Monograph/item
Title/Author:
Encrypted network traffic analysis/ by Aswani Kumar Cherukuri ... [et al.].
other author:
Cherukuri, Aswani Kumar.
Published:
Cham :Springer International Publishing : : 2024.,
Description:
xii, 99 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Preface -- Acknowledgement -- Chapter 1 Introduction -- Chapter 2 Encrypted Network Traffic Analysis -- Chapter 3 Classification of Encrypted Network Traffic -- Chapter 4 Detection of Anomalous Encrypted Traffic -- Chapter 5 AI based Approaches for Anomaly Detection.
Contained By:
Springer Nature eBook
Subject:
Computer networks - Security measures. -
Online resource:
https://doi.org/10.1007/978-3-031-62909-9
ISBN:
9783031629099
Encrypted network traffic analysis
Encrypted network traffic analysis
[electronic resource] /by Aswani Kumar Cherukuri ... [et al.]. - Cham :Springer International Publishing :2024. - xii, 99 p. :ill. (some col.), digital ;24 cm. - SpringerBriefs in computer science,2191-5776. - SpringerBriefs in computer science..
Preface -- Acknowledgement -- Chapter 1 Introduction -- Chapter 2 Encrypted Network Traffic Analysis -- Chapter 3 Classification of Encrypted Network Traffic -- Chapter 4 Detection of Anomalous Encrypted Traffic -- Chapter 5 AI based Approaches for Anomaly Detection.
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies. The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection. Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.
ISBN: 9783031629099
Standard No.: 10.1007/978-3-031-62909-9doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Encrypted network traffic analysis
LDR
:03071nmm a2200361 a 4500
001
2373874
003
DE-He213
005
20240725130820.0
006
m d
007
cr nn 008maaau
008
241231s2024 sz s 0 eng d
020
$a
9783031629099
$q
(electronic bk.)
020
$a
9783031629082
$q
(paper)
024
7
$a
10.1007/978-3-031-62909-9
$2
doi
035
$a
978-3-031-62909-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM083000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.E56 2024
245
0 0
$a
Encrypted network traffic analysis
$h
[electronic resource] /
$c
by Aswani Kumar Cherukuri ... [et al.].
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2024.
300
$a
xii, 99 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in computer science,
$x
2191-5776
505
0
$a
Preface -- Acknowledgement -- Chapter 1 Introduction -- Chapter 2 Encrypted Network Traffic Analysis -- Chapter 3 Classification of Encrypted Network Traffic -- Chapter 4 Detection of Anomalous Encrypted Traffic -- Chapter 5 AI based Approaches for Anomaly Detection.
520
$a
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies. The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection. Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Data encryption (Computer science)
$3
579162
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Cherukuri, Aswani Kumar.
$3
3722296
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
SpringerBriefs in computer science.
$3
1567571
856
4 0
$u
https://doi.org/10.1007/978-3-031-62909-9
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9494323
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login