Non-Fiction Books:

Network Traffic Anomaly Detection and Prevention

Sorry, this product is not currently available to order

Here are some other products you might consider...

Network Traffic Anomaly Detection and Prevention

Concepts, Techniques, and Tools
Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!
Unavailable
Sorry, this product is not currently available to order

Description

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools; discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality; reviews open issues and challenges in network traffic anomaly detection and prevention. This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.

Author Biography:

Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.
Release date Australia
September 19th, 2017
Audiences
  • Postgraduate, Research & Scholarly
  • Professional & Vocational
  • Undergraduate
Edition
1st ed. 2017
Illustrations
9 Illustrations, color; 89 Illustrations, black and white; XXII, 263 p. 98 illus., 9 illus. in color.
Pages
263
ISBN-13
9783319651866
Product ID
26871041

Customer reviews

Nobody has reviewed this product yet. You could be the first!

Write a Review

Marketplace listings

There are no Marketplace listings available for this product currently.
Already own it? Create a free listing and pay just 9% commission when it sells!

Sell Yours Here

Help & options

Filed under...