Cargando…

Data analysis for network cyber-security /

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyz...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Adams, Niall M., 1968- (Editor ), Heard, Nicholas (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London, UK : Imperial College Press, [2014]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn880357363
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 140521t20142014enk ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d YDXCP  |d CDX  |d OCLCO  |d E7B  |d STF  |d OCLCF  |d VRC  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO  |d AGLDB  |d OCLCQ  |d VTS  |d CEF  |d OTZ  |d REC  |d M8D  |d UKAHL  |d LEAUB  |d AU@  |d ITD  |d EYM  |d OCLCO  |d OCLCQ  |d QGK  |d OCLCO 
019 |a 1055226193  |a 1058549058  |a 1086566217  |a 1117102562  |a 1237222487  |a 1259194986 
020 |a 9781783263752  |q (electronic bk.) 
020 |a 178326375X  |q (electronic bk.) 
020 |z 1783263741 
020 |z 9781783263745 
029 1 |a CHBIS  |b 010537220 
029 1 |a CHVBK  |b 341786500 
029 1 |a DEBBG  |b BV043037150 
029 1 |a DEBSZ  |b 429936699 
029 1 |a NLGGC  |b 375710116 
029 1 |a NZ1  |b 15754660 
035 |a (OCoLC)880357363  |z (OCoLC)1055226193  |z (OCoLC)1058549058  |z (OCoLC)1086566217  |z (OCoLC)1117102562  |z (OCoLC)1237222487  |z (OCoLC)1259194986 
050 4 |a TK5105.59 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Data analysis for network cyber-security /  |c Niall Adams and Nicholas Heard, editors. 
264 1 |a London, UK :  |b Imperial College Press,  |c [2014] 
264 4 |c ©2014 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Ch. 1. Inference for graphs and networks: Adapting classical tools to modern data / Benjamin P. Olding and Patrick J. Wolfe -- ch. 2. Rapid detection of attacks in computer networks by quickest changepoint detection methods / Alexander G. Tartakovsky -- ch. 3. Statistical detection of intruders within computer networks using scan statistics / Joshua Neil [and others] -- ch. 4. Characterizing dynamic group behavior in social networks for cybernetics / Sumeet Dua and Pradeep Chowriappa -- ch. 5. Several approaches for detecting anomalies in network traffic data / Celine Levy-Leduc -- ch. 6. Monitoring a device in a communication network / Nick A. Heard and Melissa J. Turcotte. 
520 |a There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Congrès. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
655 7 |a Conference papers and proceedings  |2 fast 
700 1 |a Adams, Niall M.,  |d 1968-  |e editor. 
700 1 |a Heard, Nicholas,  |e editor. 
776 0 8 |i Print version:  |t Data analysis for network cyber-security  |z 1783263741  |w (OCoLC)876338470 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=779681  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26467479 
938 |a Coutts Information Services  |b COUT  |n 28430317 
938 |a ebrary  |b EBRY  |n ebr10871771 
938 |a EBSCOhost  |b EBSC  |n 779681 
938 |a YBP Library Services  |b YANK  |n 11808151 
994 |a 92  |b IZTAP