語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Encrypted network traffic analysis
~
Cherukuri, Aswani Kumar.
FindBook
Google Book
Amazon
博客來
Encrypted network traffic analysis
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Encrypted network traffic analysis/ by Aswani Kumar Cherukuri ... [et al.].
其他作者:
Cherukuri, Aswani Kumar.
出版者:
Cham :Springer International Publishing : : 2024.,
面頁冊數:
xii, 99 p. :ill. (some col.), digital ;24 cm.
內容註:
Preface -- Acknowledgement -- Chapter 1 Introduction -- Chapter 2 Encrypted Network Traffic Analysis -- Chapter 3 Classification of Encrypted Network Traffic -- Chapter 4 Detection of Anomalous Encrypted Traffic -- Chapter 5 AI based Approaches for Anomaly Detection.
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-62909-9
ISBN:
9783031629099
Encrypted network traffic analysis
Encrypted network traffic analysis
[electronic resource] /by Aswani Kumar Cherukuri ... [et al.]. - Cham :Springer International Publishing :2024. - xii, 99 p. :ill. (some col.), digital ;24 cm. - SpringerBriefs in computer science,2191-5776. - SpringerBriefs in computer science..
Preface -- Acknowledgement -- Chapter 1 Introduction -- Chapter 2 Encrypted Network Traffic Analysis -- Chapter 3 Classification of Encrypted Network Traffic -- Chapter 4 Detection of Anomalous Encrypted Traffic -- Chapter 5 AI based Approaches for Anomaly Detection.
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies. The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection. Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.
ISBN: 9783031629099
Standard No.: 10.1007/978-3-031-62909-9doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Encrypted network traffic analysis
LDR
:03071nmm a2200361 a 4500
001
2373874
003
DE-He213
005
20240725130820.0
006
m d
007
cr nn 008maaau
008
241231s2024 sz s 0 eng d
020
$a
9783031629099
$q
(electronic bk.)
020
$a
9783031629082
$q
(paper)
024
7
$a
10.1007/978-3-031-62909-9
$2
doi
035
$a
978-3-031-62909-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM083000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.E56 2024
245
0 0
$a
Encrypted network traffic analysis
$h
[electronic resource] /
$c
by Aswani Kumar Cherukuri ... [et al.].
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2024.
300
$a
xii, 99 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in computer science,
$x
2191-5776
505
0
$a
Preface -- Acknowledgement -- Chapter 1 Introduction -- Chapter 2 Encrypted Network Traffic Analysis -- Chapter 3 Classification of Encrypted Network Traffic -- Chapter 4 Detection of Anomalous Encrypted Traffic -- Chapter 5 AI based Approaches for Anomaly Detection.
520
$a
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies. The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection. Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Data encryption (Computer science)
$3
579162
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Cherukuri, Aswani Kumar.
$3
3722296
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
SpringerBriefs in computer science.
$3
1567571
856
4 0
$u
https://doi.org/10.1007/978-3-031-62909-9
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9494323
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入