Data Analysis for Network Cyber-Security

Nonfiction, Computers, Advanced Computing, Engineering, Neural Networks, Science & Nature, Mathematics, Statistics
Cover of the book Data Analysis for Network Cyber-Security by Niall Adams, Nicholas Heard, World Scientific Publishing Company
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Niall Adams, Nicholas Heard ISBN: 9781783263769
Publisher: World Scientific Publishing Company Publication: February 28, 2014
Imprint: ICP Language: English
Author: Niall Adams, Nicholas Heard
ISBN: 9781783263769
Publisher: World Scientific Publishing Company
Publication: February 28, 2014
Imprint: ICP
Language: English

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

  • Inference for Graphs and Networks: Adapting Classical Tools to Modern Data (Benjamin P Olding and Patrick J Wolfe)
  • Rapid Detection of Attacks in Computer Networks by Quickest Changepoint Detection Methods (Alexander G Tartakovsky)
  • Statistical Detection of Intruders Within Computer Networks Using Scan Statistics (Joshua Neil, Curtis Storlie, Curtis Hash and Alex Brugh)
  • Characterizing Dynamic Group Behavior in Social Networks for Cybernetics (Sumeet Dua and Pradeep Chowriappa)
  • Several Approaches for Detecting Anomalies in Network Traffic Data (Céline Lévy-Leduc)
  • Monitoring a Device in a Communication Network (Nicholas A Heard and Melissa Turcotte)

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

  • This book is unique in being a treatise on the statistical analysis of network traffic data
  • The contributors are leading researches in the field and will give authoritative descriptions of cutting edge methodology
  • The book features material from diverse areas, and as such forms a unified view of network cyber security
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

More books from World Scientific Publishing Company

Cover of the book Optimal Mean Reversion Trading by Niall Adams, Nicholas Heard
Cover of the book Methods of Differential Geometry in Classical Field Theories by Niall Adams, Nicholas Heard
Cover of the book Medical Biometrics by Niall Adams, Nicholas Heard
Cover of the book Exploring the Invisible Universe by Niall Adams, Nicholas Heard
Cover of the book The Economics of Social Capital and Health by Niall Adams, Nicholas Heard
Cover of the book Singapore Perspectives 2018 by Niall Adams, Nicholas Heard
Cover of the book How to Manage a Successful Business in China by Niall Adams, Nicholas Heard
Cover of the book The Concise Handbook of Analytical Spectroscopy: Theory, Applications, and Reference Materials by Niall Adams, Nicholas Heard
Cover of the book The Ethics and Biosecurity Toolkit for Scientists by Niall Adams, Nicholas Heard
Cover of the book Cardiopulmonary Physiotherapy in Trauma by Niall Adams, Nicholas Heard
Cover of the book Introduction to Carbon Capture and Sequestration by Niall Adams, Nicholas Heard
Cover of the book Cultural Patterns and Neurocognitive Circuits II by Niall Adams, Nicholas Heard
Cover of the book Management of Service Businesses in Japan by Niall Adams, Nicholas Heard
Cover of the book Finite Element Methods for Engineers by Niall Adams, Nicholas Heard
Cover of the book Waves in Gradient Metamaterials by Niall Adams, Nicholas Heard
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy