找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Network Traffic Anomaly Detection and Prevention; Concepts, Techniques Monowar H. Bhuyan,Dhruba K. Bhattacharyya,Jugal K. Textbook 2017 Spr

[復(fù)制鏈接]
查看: 31014|回復(fù): 40
樓主
發(fā)表于 2025-3-21 18:50:31 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Network Traffic Anomaly Detection and Prevention
副標(biāo)題Concepts, Techniques
編輯Monowar H. Bhuyan,Dhruba K. Bhattacharyya,Jugal K.
視頻videohttp://file.papertrans.cn/663/662862/662862.mp4
概述Provides a thorough introduction to network attacks, describes the pros and cons of various data mining approaches, and discusses important issues and challenges to be addressed.Presents a systematic,
叢書名稱Computer Communications and Networks
圖書封面Titlebook: Network Traffic Anomaly Detection and Prevention; Concepts, Techniques Monowar H. Bhuyan,Dhruba K. Bhattacharyya,Jugal K. Textbook 2017 Spr
描述This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information..Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing net
出版日期Textbook 2017
關(guān)鍵詞Anomaly Detection; Data Mining; Denial of Service; Distributed Denial of Service; Intrusion Prevention; N
版次1
doihttps://doi.org/10.1007/978-3-319-65188-0
isbn_softcover978-3-319-87968-0
isbn_ebook978-3-319-65188-0Series ISSN 1617-7975 Series E-ISSN 2197-8433
issn_series 1617-7975
copyrightSpringer International Publishing AG 2017
The information of publication is updating

書目名稱Network Traffic Anomaly Detection and Prevention影響因子(影響力)




書目名稱Network Traffic Anomaly Detection and Prevention影響因子(影響力)學(xué)科排名




書目名稱Network Traffic Anomaly Detection and Prevention網(wǎng)絡(luò)公開度




書目名稱Network Traffic Anomaly Detection and Prevention網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Network Traffic Anomaly Detection and Prevention被引頻次




書目名稱Network Traffic Anomaly Detection and Prevention被引頻次學(xué)科排名




書目名稱Network Traffic Anomaly Detection and Prevention年度引用




書目名稱Network Traffic Anomaly Detection and Prevention年度引用學(xué)科排名




書目名稱Network Traffic Anomaly Detection and Prevention讀者反饋




書目名稱Network Traffic Anomaly Detection and Prevention讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:20:46 | 只看該作者
A Systematic Hands-On Approach to Generate Real-Life Intrusion Datasets,a systematic hands-on approach to generate real-life intrusion dataset. It is organized in three major sections. Section?3.1 provides the basic concepts. Section?3.2 introduces several benchmark and real-life datasets. Finally, Sect.?3.3 provides a systematic approach toward generation of an unbiase
板凳
發(fā)表于 2025-3-22 03:39:32 | 只看該作者
Network Traffic Anomaly Detection Techniques and Systems, chapter starts with a discussion of the basic properties of network-wide traffic with an example. This chapter is organized into six major sections to describe different network anomaly detection techniques and systems. They are statistical techniques and systems, classification-based techniques an
地板
發(fā)表于 2025-3-22 05:35:39 | 只看該作者
Alert Management and Anomaly Prevention Techniques, messages (i.e., alerts) that indicate attack or suspicious or legitimate events. Due to widespread deployment of IDSs, they may generate an overwhelming number of alerts with true alerts mixed with false alerts. So, management of such alerts is indeed necessary to get to the origin of an attack, so
5#
發(fā)表于 2025-3-22 11:45:37 | 只看該作者
6#
發(fā)表于 2025-3-22 15:47:34 | 只看該作者
7#
發(fā)表于 2025-3-22 20:12:37 | 只看該作者
Open Issues, Challenges, and Conclusion,detecting such threats. Any antivirusor defense software can only detect the threats if and only if the defender software understands how attackers get entry into a system and what tools they use to compromise a network or system. This chapter is focused on the open issuesand challengesfaced by theA
8#
發(fā)表于 2025-3-22 23:59:57 | 只看該作者
9#
發(fā)表于 2025-3-23 04:40:36 | 只看該作者
10#
發(fā)表于 2025-3-23 07:53:33 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-20 18:56
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
新津县| 顺平县| 宝鸡市| 古浪县| 高唐县| 郑州市| 竹溪县| 和硕县| 崇文区| 丹凤县| 萨迦县| 治多县| 开阳县| 炎陵县| 柘荣县| 钟祥市| 鄂尔多斯市| 隆子县| 宣恩县| 伊金霍洛旗| 渝中区| 米易县| 高碑店市| 谢通门县| 土默特右旗| 长阳| 灌阳县| 方山县| 雷山县| 乌拉特前旗| 利川市| 县级市| 峨山| 辉南县| 禹州市| 鱼台县| 新密市| 钟祥市| 马鞍山市| 中江县| 邵阳市|