Network Traffic Anomaly Detection and Prevention

Concepts, Techniques, and Tools

Nonfiction, Computers, Networking & Communications, Hardware, Computer Security, General Computing
Cover of the book Network Traffic Anomaly Detection and Prevention by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita ISBN: 9783319651880
Publisher: Springer International Publishing Publication: September 3, 2017
Imprint: Springer Language: English
Author: Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
ISBN: 9783319651880
Publisher: Springer International Publishing
Publication: September 3, 2017
Imprint: Springer
Language: English

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information.

Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools; discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality; reviews open issues and challenges in network traffic anomaly detection and prevention.

This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information.

Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools; discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality; reviews open issues and challenges in network traffic anomaly detection and prevention.

This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.

More books from Springer International Publishing

Cover of the book Classification in BioApps by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Data Mining by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Automation 2017 by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Information Security Education for a Global Digital Society by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Inelastic Behavior of Materials and Structures Under Monotonic and Cyclic Loading by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Emerging Technology and Architecture for Big-data Analytics by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Design and Evaluation of Plasmonic/Magnetic Au-MFe2O4 (M-Fe/Co/Mn) Core-Shell Nanoparticles Functionalized with Doxorubicin for Cancer Therapeutics by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book The Global Water System in the Anthropocene by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Engineering Applications of Soft Computing by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Decision Making and Knowledge Decision Support Systems by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Translational Recurrences by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book European Union Policy-Making by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Microtechnology for Cell Manipulation and Sorting by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Stochasticity in Processes by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
Cover of the book Higher Education: Handbook of Theory and Research by Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy