語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Encrypted network traffic analysis
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Encrypted network traffic analysis/ by Aswani Kumar Cherukuri ... [et al.].
其他作者:
Cherukuri, Aswani Kumar.
出版者:
Cham :Springer International Publishing : : 2024.,
面頁冊數:
xii, 99 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-62909-9
ISBN:
9783031629099
Encrypted network traffic analysis
Encrypted network traffic analysis
[electronic resource] /by Aswani Kumar Cherukuri ... [et al.]. - Cham :Springer International Publishing :2024. - xii, 99 p. :ill. (some col.), digital ;24 cm. - SpringerBriefs in computer science,2191-5776. - SpringerBriefs in computer science..
Preface -- Acknowledgement -- Chapter 1 Introduction -- Chapter 2 Encrypted Network Traffic Analysis -- Chapter 3 Classification of Encrypted Network Traffic -- Chapter 4 Detection of Anomalous Encrypted Traffic -- Chapter 5 AI based Approaches for Anomaly Detection.
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies. The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection. Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.
ISBN: 9783031629099
Standard No.: 10.1007/978-3-031-62909-9doiSubjects--Topical Terms:
555385
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Encrypted network traffic analysis
LDR
:03071nam a2200361 a 4500
001
1133706
003
DE-He213
005
20240725130820.0
006
m d
007
cr nn 008maaau
008
241213s2024 sz s 0 eng d
020
$a
9783031629099
$q
(electronic bk.)
020
$a
9783031629082
$q
(paper)
024
7
$a
10.1007/978-3-031-62909-9
$2
doi
035
$a
978-3-031-62909-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM083000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.E56 2024
245
0 0
$a
Encrypted network traffic analysis
$h
[electronic resource] /
$c
by Aswani Kumar Cherukuri ... [et al.].
260
$a
Cham :
$c
2024.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xii, 99 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in computer science,
$x
2191-5776
505
0
$a
Preface -- Acknowledgement -- Chapter 1 Introduction -- Chapter 2 Encrypted Network Traffic Analysis -- Chapter 3 Classification of Encrypted Network Traffic -- Chapter 4 Detection of Anomalous Encrypted Traffic -- Chapter 5 AI based Approaches for Anomaly Detection.
520
$a
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies. The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection. Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Data encryption (Computer science)
$3
658943
650
1 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Mobile and Network Security.
$3
1211619
700
1
$a
Cherukuri, Aswani Kumar.
$e
editor.
$3
1283219
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
SpringerBriefs in computer science.
$3
883114
856
4 0
$u
https://doi.org/10.1007/978-3-031-62909-9
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入