Skip to search
Skip to main content
Catalog
Help
Feedback
Your Account
Library Account
Bookmarks
(
0
)
Search History
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Network traffic anomaly detection and prevention : concepts, techniques, and tools / Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita.
Author
Bhuyan, Monowar H.
[Browse]
Format
Book
Language
English
Published/Created
Cham, Switzerland : Springer, [2017]
Description
xxii, 263 pages ; 24 cm.
Availability
Copies in the Library
Location
Call Number
Status
Location Service
Notes
Engineering Library - Stacks
TK5105.59 .B53 2017
Browse related items
Request
Details
Subject(s)
Intrusion detection systems (Computer security)
[Browse]
Computer networks
—
Monitoring
[Browse]
Data mining
[Browse]
Author
Bhattacharyya, Dhruba K.
[Browse]
Kalita, Jugal Kumar
[Browse]
Series
Computer communications and networks
[More in this series]
Summary note
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: Introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks Describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets Provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners Examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing Presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools Discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality Reviews open issues and challenges in network traffic anomaly detection and prevention This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference. Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.
Bibliographic references
Includes bibliographical references and index.
Contents
Introduction
Networks and Network Traffic Anomalies
A Systematic Hands-on Approach to Generate Real-Life Intrusion Datasets
Network Traffic Anomaly Detection Techniques and Systems
Alert Management and Anomaly Prevention Techniques
Practical Tools for Attackers and Defenders
Evaluation Criteria
Open Issues, Challenges and Conclusion.
Show 5 more Contents items
ISBN
3319651862 (hardcover)
9783319651866 (hardcover)
OCLC
994787379
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information