語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Network traffic anomaly detection an...
~
Bhuyan, Monowar H.
FindBook
Google Book
Amazon
博客來
Network traffic anomaly detection and prevention = concepts, techniques, and tools /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Network traffic anomaly detection and prevention/ by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita.
其他題名:
concepts, techniques, and tools /
作者:
Bhuyan, Monowar H.
其他作者:
Bhattacharyya, Dhruba K.
出版者:
Cham :Springer International Publishing : : 2017.,
面頁冊數:
xxii, 263 p. :ill. (some col.), digital ;24 cm.
內容註:
Introduction -- Networks and Network Traffic Anomalies -- A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets -- Network Traffic Anomaly Detection Techniques and Systems -- Alert Management and Anomaly Prevention Techniques -- Practical Tools for Attackers and Defenders -- Evaluation Criteria -- Open Issues, Challenges and Conclusion.
Contained By:
Springer eBooks
標題:
Intrusion detection systems (Computer security) -
電子資源:
http://dx.doi.org/10.1007/978-3-319-65188-0
ISBN:
9783319651880
Network traffic anomaly detection and prevention = concepts, techniques, and tools /
Bhuyan, Monowar H.
Network traffic anomaly detection and prevention
concepts, techniques, and tools /[electronic resource] :by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita. - Cham :Springer International Publishing :2017. - xxii, 263 p. :ill. (some col.), digital ;24 cm. - Computer communications and networks,1617-7975. - Computer communications and networks..
Introduction -- Networks and Network Traffic Anomalies -- A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets -- Network Traffic Anomaly Detection Techniques and Systems -- Alert Management and Anomaly Prevention Techniques -- Practical Tools for Attackers and Defenders -- Evaluation Criteria -- Open Issues, Challenges and Conclusion.
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: Introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks Describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets Provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners Examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing Presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools Discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality Reviews open issues and challenges in network traffic anomaly detection and prevention This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference. Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.
ISBN: 9783319651880
Standard No.: 10.1007/978-3-319-65188-0doiSubjects--Topical Terms:
1085454
Intrusion detection systems (Computer security)
LC Class. No.: TK5105.59
Dewey Class. No.: 005.83
Network traffic anomaly detection and prevention = concepts, techniques, and tools /
LDR
:03651nmm a2200325 a 4500
001
2108862
003
DE-He213
005
20170904172405.0
006
m d
007
cr nn 008maaau
008
180519s2017 gw s 0 eng d
020
$a
9783319651880
$q
(electronic bk.)
020
$a
9783319651866
$q
(paper)
024
7
$a
10.1007/978-3-319-65188-0
$2
doi
035
$a
978-3-319-65188-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
082
0 4
$a
005.83
$2
23
090
$a
TK5105.59
$b
.B575 2017
100
1
$a
Bhuyan, Monowar H.
$3
3258590
245
1 0
$a
Network traffic anomaly detection and prevention
$h
[electronic resource] :
$b
concepts, techniques, and tools /
$c
by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
xxii, 263 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Computer communications and networks,
$x
1617-7975
505
0
$a
Introduction -- Networks and Network Traffic Anomalies -- A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets -- Network Traffic Anomaly Detection Techniques and Systems -- Alert Management and Anomaly Prevention Techniques -- Practical Tools for Attackers and Defenders -- Evaluation Criteria -- Open Issues, Challenges and Conclusion.
520
$a
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: Introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks Describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets Provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners Examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing Presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools Discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality Reviews open issues and challenges in network traffic anomaly detection and prevention This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference. Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.
650
0
$a
Intrusion detection systems (Computer security)
$3
1085454
650
0
$a
Computer networks
$x
Monitoring.
$3
1639856
650
0
$a
Data mining.
$3
562972
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Performance and Reliability.
$3
893430
650
2 4
$a
Communications Engineering, Networks.
$3
891094
700
1
$a
Bhattacharyya, Dhruba K.
$3
3258591
700
1
$a
Kalita, Jugal K.
$3
3258592
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Computer communications and networks.
$3
1568371
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-65188-0
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9323264
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入