Data Analysis for Network Cyber-Security

Nonfiction, Computers, Advanced Computing, Engineering, Neural Networks, Science & Nature, Mathematics, Statistics
Cover of the book Data Analysis for Network Cyber-Security by Niall Adams, Nicholas Heard, World Scientific Publishing Company
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Niall Adams, Nicholas Heard ISBN: 9781783263769
Publisher: World Scientific Publishing Company Publication: February 28, 2014
Imprint: ICP Language: English
Author: Niall Adams, Nicholas Heard
ISBN: 9781783263769
Publisher: World Scientific Publishing Company
Publication: February 28, 2014
Imprint: ICP
Language: English

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

  • Inference for Graphs and Networks: Adapting Classical Tools to Modern Data (Benjamin P Olding and Patrick J Wolfe)
  • Rapid Detection of Attacks in Computer Networks by Quickest Changepoint Detection Methods (Alexander G Tartakovsky)
  • Statistical Detection of Intruders Within Computer Networks Using Scan Statistics (Joshua Neil, Curtis Storlie, Curtis Hash and Alex Brugh)
  • Characterizing Dynamic Group Behavior in Social Networks for Cybernetics (Sumeet Dua and Pradeep Chowriappa)
  • Several Approaches for Detecting Anomalies in Network Traffic Data (Céline Lévy-Leduc)
  • Monitoring a Device in a Communication Network (Nicholas A Heard and Melissa Turcotte)

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

  • This book is unique in being a treatise on the statistical analysis of network traffic data
  • The contributors are leading researches in the field and will give authoritative descriptions of cutting edge methodology
  • The book features material from diverse areas, and as such forms a unified view of network cyber security
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Contents:

Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:

More books from World Scientific Publishing Company

Cover of the book After the Beginning by Niall Adams, Nicholas Heard
Cover of the book China's Development by Niall Adams, Nicholas Heard
Cover of the book A Course in Analysis by Niall Adams, Nicholas Heard
Cover of the book Probing the Meaning of Quantum Mechanics by Niall Adams, Nicholas Heard
Cover of the book Singapore's Fiscal Strategies for Growth by Niall Adams, Nicholas Heard
Cover of the book Functional Materials from Lignin by Niall Adams, Nicholas Heard
Cover of the book Climate Change and the Energy Problem by Niall Adams, Nicholas Heard
Cover of the book Quantum Structural Studies by Niall Adams, Nicholas Heard
Cover of the book Hilbert Space and Quantum Mechanics by Niall Adams, Nicholas Heard
Cover of the book Annual Review of Low-Carbon Development in China: 2010 by Niall Adams, Nicholas Heard
Cover of the book Applying to American Universities and Colleges for Parents and Students by Niall Adams, Nicholas Heard
Cover of the book Understanding Basic Chemistry by Niall Adams, Nicholas Heard
Cover of the book Logic Non-Volatile Memory by Niall Adams, Nicholas Heard
Cover of the book A Mathematical Introduction to Control Theory by Niall Adams, Nicholas Heard
Cover of the book The WSPC Reference on Organic Electronics: Organic Semiconductors by Niall Adams, Nicholas Heard
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy