Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Network Behavior Analysis = Measurement, Models, and Applications /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Network Behavior Analysis/ by Kuai Xu.
Reminder of title:
Measurement, Models, and Applications /
Author:
Xu, Kuai.
Description:
XI, 163 p. 66 illus., 59 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer networks . -
Online resource:
https://doi.org/10.1007/978-981-16-8325-1
ISBN:
9789811683251
Network Behavior Analysis = Measurement, Models, and Applications /
Xu, Kuai.
Network Behavior Analysis
Measurement, Models, and Applications /[electronic resource] :by Kuai Xu. - 1st ed. 2022. - XI, 163 p. 66 illus., 59 illus. in color.online resource.
Chapter 1: Introduction -- Chapter 2: Background of Network Behavior Modeling and Analysis -- Chapter 3: Behavior Modeling of Network Traffic -- Chapter 4: Structural Modeling of Network Traffic -- Chapter 5: Graphic Modeling of Network Traffic -- Chapter 6: Real-Time Network Behavior Analysis -- Chapter 7: Applications -- Chapter 8: Research Frontiers of Network Behavior Analysis.
This book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet “objects” such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks. The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections. The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications.
ISBN: 9789811683251
Standard No.: 10.1007/978-981-16-8325-1doiSubjects--Topical Terms:
1365720
Computer networks .
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Network Behavior Analysis = Measurement, Models, and Applications /
LDR
:04202nam a22003975i 4500
001
1091833
003
DE-He213
005
20220501121550.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811683251
$9
978-981-16-8325-1
024
7
$a
10.1007/978-981-16-8325-1
$2
doi
035
$a
978-981-16-8325-1
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
100
1
$a
Xu, Kuai.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1067072
245
1 0
$a
Network Behavior Analysis
$h
[electronic resource] :
$b
Measurement, Models, and Applications /
$c
by Kuai Xu.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XI, 163 p. 66 illus., 59 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: Introduction -- Chapter 2: Background of Network Behavior Modeling and Analysis -- Chapter 3: Behavior Modeling of Network Traffic -- Chapter 4: Structural Modeling of Network Traffic -- Chapter 5: Graphic Modeling of Network Traffic -- Chapter 6: Real-Time Network Behavior Analysis -- Chapter 7: Applications -- Chapter 8: Research Frontiers of Network Behavior Analysis.
520
$a
This book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet “objects” such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks. The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections. The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications.
650
0
$a
Computer networks .
$3
1365720
650
0
$a
Data mining.
$3
528622
650
0
$a
Computer science.
$3
573171
650
1 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
677765
650
2 4
$a
Computer Science.
$3
593922
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811683244
776
0 8
$i
Printed edition:
$z
9789811683268
776
0 8
$i
Printed edition:
$z
9789811683275
856
4 0
$u
https://doi.org/10.1007/978-981-16-8325-1
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login