Data Analysis for Network Cyber-Security

Nonfiction, Computers, Advanced Computing, Engineering, Neural Networks, Science & Nature, Mathematics, Statistics
Cover of the book Data Analysis for Network Cyber-Security by Niall Adams, Nicholas Heard, World Scientific Publishing Company
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Niall Adams, Nicholas Heard ISBN: 9781783263769
Publisher: World Scientific Publishing Company Publication: February 28, 2014
Imprint: ICP Language: English
Author: Niall Adams, Nicholas Heard
ISBN: 9781783263769
Publisher: World Scientific Publishing Company
Publication: February 28, 2014
Imprint: ICP
Language: English

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

  • Inference for Graphs and Networks: Adapting Classical Tools to Modern Data (Benjamin P Olding and Patrick J Wolfe)
  • Rapid Detection of Attacks in Computer Networks by Quickest Changepoint Detection Methods (Alexander G Tartakovsky)
  • Statistical Detection of Intruders Within Computer Networks Using Scan Statistics (Joshua Neil, Curtis Storlie, Curtis Hash and Alex Brugh)
  • Characterizing Dynamic Group Behavior in Social Networks for Cybernetics (Sumeet Dua and Pradeep Chowriappa)
  • Several Approaches for Detecting Anomalies in Network Traffic Data (Céline Lévy-Leduc)
  • Monitoring a Device in a Communication Network (Nicholas A Heard and Melissa Turcotte)

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

  • This book is unique in being a treatise on the statistical analysis of network traffic data
  • The contributors are leading researches in the field and will give authoritative descriptions of cutting edge methodology
  • The book features material from diverse areas, and as such forms a unified view of network cyber security
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

More books from World Scientific Publishing Company

Cover of the book Lecture Notes on Calculus of Variations by Niall Adams, Nicholas Heard
Cover of the book Evidence-based Clinical Chinese Medicine by Niall Adams, Nicholas Heard
Cover of the book Holistic Business Process Management by Niall Adams, Nicholas Heard
Cover of the book Design, Manufacturing and Mechatronics by Niall Adams, Nicholas Heard
Cover of the book Cucurbiturils by Niall Adams, Nicholas Heard
Cover of the book Edu-renaissance by Niall Adams, Nicholas Heard
Cover of the book Single-Particle Cryo-Electron Microscopy by Niall Adams, Nicholas Heard
Cover of the book Order, Disorder and Criticality by Niall Adams, Nicholas Heard
Cover of the book Crystal Growth for Beginners by Niall Adams, Nicholas Heard
Cover of the book Proceedings of the Eighth Saudi Students Conference in the UK by Niall Adams, Nicholas Heard
Cover of the book Number Treasury3 by Niall Adams, Nicholas Heard
Cover of the book Analysis and Mathematical Physics by Niall Adams, Nicholas Heard
Cover of the book Ordinary and Partial Differential Equations for the Beginner by Niall Adams, Nicholas Heard
Cover of the book Thanatia: The Destiny of the Earth's Mineral Resources by Niall Adams, Nicholas Heard
Cover of the book Flexoelectricity in Liquid Crystals by Niall Adams, Nicholas Heard
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy