Data Analysis for Network Cyber-Security

Nonfiction, Computers, Advanced Computing, Engineering, Neural Networks, Science & Nature, Mathematics, Statistics
Cover of the book Data Analysis for Network Cyber-Security by Niall Adams, Nicholas Heard, World Scientific Publishing Company
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Niall Adams, Nicholas Heard ISBN: 9781783263769
Publisher: World Scientific Publishing Company Publication: February 28, 2014
Imprint: ICP Language: English
Author: Niall Adams, Nicholas Heard
ISBN: 9781783263769
Publisher: World Scientific Publishing Company
Publication: February 28, 2014
Imprint: ICP
Language: English

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

  • Inference for Graphs and Networks: Adapting Classical Tools to Modern Data (Benjamin P Olding and Patrick J Wolfe)
  • Rapid Detection of Attacks in Computer Networks by Quickest Changepoint Detection Methods (Alexander G Tartakovsky)
  • Statistical Detection of Intruders Within Computer Networks Using Scan Statistics (Joshua Neil, Curtis Storlie, Curtis Hash and Alex Brugh)
  • Characterizing Dynamic Group Behavior in Social Networks for Cybernetics (Sumeet Dua and Pradeep Chowriappa)
  • Several Approaches for Detecting Anomalies in Network Traffic Data (Céline Lévy-Leduc)
  • Monitoring a Device in a Communication Network (Nicholas A Heard and Melissa Turcotte)

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

  • This book is unique in being a treatise on the statistical analysis of network traffic data
  • The contributors are leading researches in the field and will give authoritative descriptions of cutting edge methodology
  • The book features material from diverse areas, and as such forms a unified view of network cyber security
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

More books from World Scientific Publishing Company

Cover of the book A Chorus of Bells and Other Scientific Inquiries by Niall Adams, Nicholas Heard
Cover of the book China by Niall Adams, Nicholas Heard
Cover of the book After the Beginning by Niall Adams, Nicholas Heard
Cover of the book Encyclopedia of Thermal Packaging by Niall Adams, Nicholas Heard
Cover of the book Electronic Trading and Blockchain by Niall Adams, Nicholas Heard
Cover of the book Research, Fabrication and Applications of Bi-2223 HTS Wires by Niall Adams, Nicholas Heard
Cover of the book The Resilience of Networked Infrastructure Systems by Niall Adams, Nicholas Heard
Cover of the book The World Scientific Encyclopedia of Nanomedicine and Bioengineering I by Niall Adams, Nicholas Heard
Cover of the book Advances in Data Envelopment Analysis by Niall Adams, Nicholas Heard
Cover of the book Abstract Algebra by Niall Adams, Nicholas Heard
Cover of the book Classical Theory of Crystal Dislocations by Niall Adams, Nicholas Heard
Cover of the book Governing Asia by Niall Adams, Nicholas Heard
Cover of the book Advanced Mathematical and Computational Tools in Metrology and Testing XI by Niall Adams, Nicholas Heard
Cover of the book Big Data and the Computable Society by Niall Adams, Nicholas Heard
Cover of the book Local Zeta Regularization and the Scalar Casimir Effect by Niall Adams, Nicholas Heard
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy