Data Analysis for Network Cyber-Security

Nonfiction, Computers, Advanced Computing, Engineering, Neural Networks, Science & Nature, Mathematics, Statistics
Cover of the book Data Analysis for Network Cyber-Security by Niall Adams, Nicholas Heard, World Scientific Publishing Company
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Niall Adams, Nicholas Heard ISBN: 9781783263769
Publisher: World Scientific Publishing Company Publication: February 28, 2014
Imprint: ICP Language: English
Author: Niall Adams, Nicholas Heard
ISBN: 9781783263769
Publisher: World Scientific Publishing Company
Publication: February 28, 2014
Imprint: ICP
Language: English

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

  • Inference for Graphs and Networks: Adapting Classical Tools to Modern Data (Benjamin P Olding and Patrick J Wolfe)
  • Rapid Detection of Attacks in Computer Networks by Quickest Changepoint Detection Methods (Alexander G Tartakovsky)
  • Statistical Detection of Intruders Within Computer Networks Using Scan Statistics (Joshua Neil, Curtis Storlie, Curtis Hash and Alex Brugh)
  • Characterizing Dynamic Group Behavior in Social Networks for Cybernetics (Sumeet Dua and Pradeep Chowriappa)
  • Several Approaches for Detecting Anomalies in Network Traffic Data (Céline Lévy-Leduc)
  • Monitoring a Device in a Communication Network (Nicholas A Heard and Melissa Turcotte)

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

  • This book is unique in being a treatise on the statistical analysis of network traffic data
  • The contributors are leading researches in the field and will give authoritative descriptions of cutting edge methodology
  • The book features material from diverse areas, and as such forms a unified view of network cyber security
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

More books from World Scientific Publishing Company

Cover of the book East Asia by Niall Adams, Nicholas Heard
Cover of the book Engineering of Chemical Complexity II by Niall Adams, Nicholas Heard
Cover of the book Probability and Finance Theory by Niall Adams, Nicholas Heard
Cover of the book Drivers of Competitiveness by Niall Adams, Nicholas Heard
Cover of the book Statistical Data Science by Niall Adams, Nicholas Heard
Cover of the book The Aging Lungs by Niall Adams, Nicholas Heard
Cover of the book Globalization and Localization by Niall Adams, Nicholas Heard
Cover of the book Control and Inverse Problems for Partial Differential Equations by Niall Adams, Nicholas Heard
Cover of the book Energy and Economic Theory by Niall Adams, Nicholas Heard
Cover of the book Disposable and Flexible Chemical Sensors and Biosensors Made with Renewable Materials by Niall Adams, Nicholas Heard
Cover of the book Capture Gamma-Ray Spectroscopy and Related Topics by Niall Adams, Nicholas Heard
Cover of the book The Region and Trade by Niall Adams, Nicholas Heard
Cover of the book M(odified) E(ssay) Q(uestions) for Medicine Finals by Niall Adams, Nicholas Heard
Cover of the book Synthesis and Applications of Optically Active Nanomaterials by Niall Adams, Nicholas Heard
Cover of the book China by Niall Adams, Nicholas Heard
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy