Network traffic anomaly detection and prevention concepts, techniques, and tools

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on...

Full description

Saved in:
Bibliographic Details
Main Authors: Bhuyan, Monowar H. (Author), Bhattacharyya, Dhruba K. (Author), Kalita, Jugal Kumar (Author)
Format: Book
Language:English
Published: Cham, Switzerland Springer 2017
Series:Computer communications and networks
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 52268
003 MY-KLNDU
005 20241219014142.0
008 221104 20172017sz a b 001 0 eng d
020 |a 9783319651866 
039 9 |a 202211041223  |b VLOAD  |c 201904121541  |d faezah  |y 201809271517  |z helmey 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a TK 5105.59  |b .B48 2017 
100 1 |a Bhuyan, Monowar H.  |e author 
245 1 0 |a Network traffic anomaly detection and prevention  |b concepts, techniques, and tools  |c Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita 
264 1 |a Cham, Switzerland  |b Springer  |c 2017 
264 4 |c © 2017 
300 |a xxii, 263 pages  |b illustrations  |c 24 cm. 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a a volume  |2 rdacarrier 
490 1 |a Computer communications and networks  |x 1617-7975 
504 |a Includes bibliographical references and index 
520 |a This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information 
592 |a 36229  |b 27/2/2019  |c RM 351.64  |h Bookline 
650 0 |a Intrusion detection systems (Computer security) 
650 0 |a Computer networksœxMonitoring 
650 0 |a Data mining 
700 1 |a Bhattacharyya, Dhruba K.  |e author 
700 1 |a Kalita, Jugal Kumar  |e author 
830 0 |a Computer communications and networks  |x 1617-7975 
999 |a vtls000061623  |c 52268  |d 52268