𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Network traffic anomaly detection and prevention : concepts, techniques, and tools

✍ Scribed by Bhattacharyya, Dhruba K.; Bhuyan, Monowar H.; Kalita, Jugal Kumar


Publisher
Springer
Year
2017
Tongue
English
Leaves
278
Series
Computer communications and networks
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information.

Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools; discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality; reviews open issues and challenges in network traffic anomaly detection and prevention.

This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.

✦ Table of Contents


Front Matter ....Pages i-xxii
Introduction (Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita)....Pages 1-13
Networks and Network Traffic Anomalies (Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita)....Pages 15-69
A Systematic Hands-On Approach to Generate Real-Life Intrusion Datasets (Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita)....Pages 71-114
Network Traffic Anomaly Detection Techniques and Systems (Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita)....Pages 115-169
Alert Management and Anomaly Prevention Techniques (Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita)....Pages 171-199
Practical Tools for Attackers and Defenders (Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita)....Pages 201-242
Evaluation Criteria (Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita)....Pages 243-252
Open Issues, Challenges, and Conclusion (Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita)....Pages 253-257
Back Matter ....Pages 259-263

✦ Subjects


Intrusion detection systems (Computer security);Computer networks -- Monitoring;Data mining


πŸ“œ SIMILAR VOLUMES


Network Intrusion Detection and Preventi
✍ Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee (auth.) πŸ“‚ Library πŸ“… 2010 πŸ› Springer US 🌐 English

<p><P>With the complexity of today's networks, it is impossible to know you are actually secure. You can prepare your network's defenses, but what threats will be thrown at it, what combinations will be tried, and what directions they will come from are all unknown variables. Most medium and large-s

Network Intrusion Detection and Preventi
✍ Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee (auth.) πŸ“‚ Library πŸ“… 2010 πŸ› Springer US 🌐 English

<p><P>With the complexity of today's networks, it is impossible to know you are actually secure. You can prepare your network's defenses, but what threats will be thrown at it, what combinations will be tried, and what directions they will come from are all unknown variables. Most medium and large-s

Network Classification for Traffic Manag
✍ Zahir Tari, Adil Fahad, Abdulmohsen Almalawi, Xun Yi πŸ“‚ Library πŸ“… 2020 πŸ› Institution of Engineering and Technology 🌐 English

<p>With the massive increase of data and traffic on the Internet within the 5G, IoT and smart cities frameworks, current network classification and analysis techniques are falling short. Novel approaches using machine learning algorithms are needed to cope with and manage real-world network traffic,

Traffic Anomaly Detection
✍ Antonio Cuadra-SΓ‘nchez, Javier Aracil πŸ“‚ Library πŸ“… 2015 πŸ› ISTE Press - Elsevier 🌐 English

<p>This book presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consi