Network traffic anomaly detection and prevention concepts, techniques, and tools
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Cham, Switzerland
Springer
2017
|
| Series: | Computer communications and networks
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 52268 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219014142.0 | ||
| 008 | 221104 20172017sz a b 001 0 eng d | ||
| 020 | |a 9783319651866 | ||
| 039 | 9 | |a 202211041223 |b VLOAD |c 201904121541 |d faezah |y 201809271517 |z helmey | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a TK 5105.59 |b .B48 2017 | ||
| 100 | 1 | |a Bhuyan, Monowar H. |e author | |
| 245 | 1 | 0 | |a Network traffic anomaly detection and prevention |b concepts, techniques, and tools |c Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita |
| 264 | 1 | |a Cham, Switzerland |b Springer |c 2017 | |
| 264 | 4 | |c © 2017 | |
| 300 | |a xxii, 263 pages |b illustrations |c 24 cm. | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a a volume |2 rdacarrier | ||
| 490 | 1 | |a Computer communications and networks |x 1617-7975 | |
| 504 | |a Includes bibliographical references and index | ||
| 520 | |a This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information | ||
| 592 | |a 36229 |b 27/2/2019 |c RM 351.64 |h Bookline | ||
| 650 | 0 | |a Intrusion detection systems (Computer security) | |
| 650 | 0 | |a Computer networksxMonitoring | |
| 650 | 0 | |a Data mining | |
| 700 | 1 | |a Bhattacharyya, Dhruba K. |e author | |
| 700 | 1 | |a Kalita, Jugal Kumar |e author | |
| 830 | 0 | |a Computer communications and networks |x 1617-7975 | |
| 999 | |a vtls000061623 |c 52268 |d 52268 | ||


