Statistical techniques for network security: modern statistically-based intrusion detection and protection
"This book aims to provide a guide for applying modern statistical techniques for intrusion detection and prevention, and serve as a reference for individuals such as network administrators, information and network security specialists, IT professionals, IT-related risk analysis and management...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book aims to provide a guide for applying modern statistical techniques for intrusion detection and prevention, and serve as a reference for individuals such as network administrators, information and network security specialists, IT professionals, IT-related risk analysis and management professionals, and students and researchers who are interested in the use of statistical techniques for network security"--Provided by publisher "This book aims to provide a guide for applying modern statistical techniques for intrusion detection and prevention, and serve as a reference for individuals such as network administrators, information and network security specialists, IT professionals, IT-related risk analysis and management professionals, and students and researchers who are interested in the use of statistical techniques for network security"--Provided by publisher |
Beschreibung: | "Premier reference source"--Cover. - Includes bibliographical references and index |
Beschreibung: | xii, 461 p. ill 27 cm |
ISBN: | 159904708X 9781599047089 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035169760 | ||
003 | DE-604 | ||
005 | 20090221 | ||
007 | t | ||
008 | 081119s2009 a||| |||| 00||| eng d | ||
010 | |a 2008023192 | ||
020 | |a 159904708X |c hbk |9 1-599-04708-X | ||
020 | |a 9781599047089 |c hbk |9 978-1-599-04708-9 | ||
035 | |a (OCoLC)231834146 | ||
035 | |a (DE-599)GBV569479142 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
100 | 1 | |a Wang, Yun |e Verfasser |4 aut | |
245 | 1 | 0 | |a Statistical techniques for network security |b modern statistically-based intrusion detection and protection |c Yun Wang |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c 2009 | |
300 | |a xii, 461 p. |b ill |c 27 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "Premier reference source"--Cover. - Includes bibliographical references and index | ||
520 | 1 | |a "This book aims to provide a guide for applying modern statistical techniques for intrusion detection and prevention, and serve as a reference for individuals such as network administrators, information and network security specialists, IT professionals, IT-related risk analysis and management professionals, and students and researchers who are interested in the use of statistical techniques for network security"--Provided by publisher | |
520 | 8 | |a "This book aims to provide a guide for applying modern statistical techniques for intrusion detection and prevention, and serve as a reference for individuals such as network administrators, information and network security specialists, IT professionals, IT-related risk analysis and management professionals, and students and researchers who are interested in the use of statistical techniques for network security"--Provided by publisher | |
650 | 0 | |a Computer networks / Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Statistik |0 (DE-588)4056995-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 2 | |a Statistik |0 (DE-588)4056995-0 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 1-599-04710-1 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-599-04710-2 |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016976720&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016976720 |
Datensatz im Suchindex
_version_ | 1804138337312702464 |
---|---|
adam_text | Table
of
Contents
Preface
.............................................................................................................................
viii
Acknowledgment
..............................................................................................................xi
Section I:
Foundations
Chapter I
Statistical Opportunities, Roles, and Challenges in Network Security
.........................1
Introduction
..........................................................................................................................1
Overview
..............................................................................................................................2
Statistical Approaches in Practice
.....................................................................................14
Fundamental Statistical Roles and Challenges in Network Security.
................................22
Summary
............................................................................................................................27
References
..........................................................................................................................27
Endnotes.............................................................................................................................34
Chapter II
Statistical Analysis Software
...........................................................................................35
Introduction
........................................................................................................................35
The
SAS
System
..................................................................................................................37
STATA
.................................................................................................................................45
R.........................................................................................................................................
48
Other Packages
..................................................................................................................54
Summary
............................................................................................................................58
References
..........................................................................................................................59
Endnotes.............................................................................................................................59
Chapter III
Network Traffic and Data
................................................................................................60
Introduction
........................................................................................................................60
System-Specific Traffic
.......................................................................................................60
User-Specific Data
.............................................................................................................65
Publicly Available Data
.....................................................................................................70
Summary
............................................................................................................................91
References
..........................................................................................................................92
Endnotes.............................................................................................................................94
Appendix
............................................................................................................................95
Chapter IV
Network Data Characteristics
......................................................................................104
Introduction
......................................................................................................................104
Random Variables
...........................................................................................................105
Variable Distributions
......................................................................................................109
Network Data Modules
....................................................................................................116
Summary
..........................................................................................................................121
References
........................................................................................................................121
Section II:
Data Mining and Modeling
Chapter V
Exploring Network Data
...............................................................................................124
Introduction
......................................................................................................................124
Descriptive Analysis
.........................................................................................................125
Visualizing Analysis
.........................................................................................................134
Data Transformation
........................................................................................................144
Summary
..........................................................................................................................155
References
........................................................................................................................156
Appendix
..........................................................................................................................157
Chapter VI
Data Reduction
...............................................................................................................172
Introduction
......................................................................................................................172
Data Structure Detection
.................................................................................................173
Sampling Network Traffic
................................................................................................188
Sample Size
......................................................................................................................199
Summary
..........................................................................................................................206
References
........................................................................................................................206
Appendix
..........................................................................................................................210
Chapter
VII
Models Network Data for Association and Prediction
...............................................220
Introduction
......................................................................................................................220
Bivariate Analysis
............................................................................................................221
Linear Regression Modeling
............................................................................................232
Robustness Association
....................................................................................................249
Summary
..........................................................................................................................257
References
........................................................................................................................257
Appendix
..........................................................................................................................260
Chapter
VIII
Measuring User Behavior
..............................................................................................261
Introduction
......................................................................................................................261
User Behavior Pattern
.....................................................................................................262
Scoring Methods
..............................................................................................................276
Profiling Models
...............................................................................................................286
Summary
..........................................................................................................................297
References
........................................................................................................................297
Appendix
..........................................................................................................................301
Section III:
Classifications, Profiles, and Making Better Decisions
Chapter IX
Classification Based on Supervised Learning
.............................................................305
Introduction
......................................................................................................................305
Generalized Linear Methods
...........................................................................................306
Nonparametric Methods
..................................................................................................316
Other Linear and Nonlinear Methods
..............................................................................333
Summary
..........................................................................................................................342
References
........................................................................................................................343
Endnote............................................................................................................................347
Chapter X
Classification Based on Unsupervised Learning
.........................................................348
Introduction
......................................................................................................................348
Probability Models
...........................................................................................................349
Similarity Models
.............................................................................................................365
Multidimensional Models
................................................................................................379
Summary
..........................................................................................................................390
References
........................................................................................................................392
Appendix
..........................................................................................................................395
Chapter XI
Decision Analysis in Network Security
........................................................................396
Introduction
......................................................................................................................396
Analysis of Uncertainty
....................................................................................................398
Statistical Control Chart
..................................................................................................411
Ranking
............................................................................................................................415
Summary
..........................................................................................................................422
References
........................................................................................................................423
Appendix
..........................................................................................................................425
Chapter
XII
Evaluation
......................................................................................................................427
Introduction
......................................................................................................................427
Data Reliability, Validity, and Quality
.............................................................................428
Goodness of Classification
...............................................................................................435
Assess Model Performance
..............................................................................................447
Summary
..........................................................................................................................455
References
........................................................................................................................456
About the Author
...........................................................................................................458
Index
................................................................................................................................459
|
adam_txt |
Table
of
Contents
Preface
.
viii
Acknowledgment
.xi
Section I:
Foundations
Chapter I
Statistical Opportunities, Roles, and Challenges in Network Security
.1
Introduction
.1
Overview
.2
Statistical Approaches in Practice
.14
Fundamental Statistical Roles and Challenges in Network Security.
.22
Summary
.27
References
.27
Endnotes.34
Chapter II
Statistical Analysis Software
.35
Introduction
.35
The
SAS
System
.37
STATA
.45
R.
48
Other Packages
.54
Summary
.58
References
.59
Endnotes.59
Chapter III
Network Traffic and Data
.60
Introduction
.60
System-Specific Traffic
.60
User-Specific Data
.65
Publicly Available Data
.70
Summary
.91
References
.92
Endnotes.94
Appendix
.95
Chapter IV
Network Data Characteristics
.104
Introduction
.104
Random Variables
.105
Variable Distributions
.109
Network Data Modules
.116
Summary
.121
References
.121
Section II:
Data Mining and Modeling
Chapter V
Exploring Network Data
.124
Introduction
.124
Descriptive Analysis
.125
Visualizing Analysis
.134
Data Transformation
.144
Summary
.155
References
.156
Appendix
.157
Chapter VI
Data Reduction
.172
Introduction
.172
Data Structure Detection
.173
Sampling Network Traffic
.188
Sample Size
.199
Summary
.206
References
.206
Appendix
.210
Chapter
VII
Models Network Data for Association and Prediction
.220
Introduction
.220
Bivariate Analysis
.221
Linear Regression Modeling
.232
Robustness Association
.249
Summary
.257
References
.257
Appendix
.260
Chapter
VIII
Measuring User Behavior
.261
Introduction
.261
User Behavior Pattern
.262
Scoring Methods
.276
Profiling Models
.286
Summary
.297
References
.297
Appendix
.301
Section III:
Classifications, Profiles, and Making Better Decisions
Chapter IX
Classification Based on Supervised Learning
.305
Introduction
.305
Generalized Linear Methods
.306
Nonparametric Methods
.316
Other Linear and Nonlinear Methods
.333
Summary
.342
References
.343
Endnote.347
Chapter X
Classification Based on Unsupervised Learning
.348
Introduction
.348
Probability Models
.349
Similarity Models
.365
Multidimensional Models
.379
Summary
.390
References
.392
Appendix
.395
Chapter XI
Decision Analysis in Network Security
.396
Introduction
.396
Analysis of Uncertainty
.398
Statistical Control Chart
.411
Ranking
.415
Summary
.422
References
.423
Appendix
.425
Chapter
XII
Evaluation
.427
Introduction
.427
Data Reliability, Validity, and Quality
.428
Goodness of Classification
.435
Assess Model Performance
.447
Summary
.455
References
.456
About the Author
.458
Index
.459 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Wang, Yun |
author_facet | Wang, Yun |
author_role | aut |
author_sort | Wang, Yun |
author_variant | y w yw |
building | Verbundindex |
bvnumber | BV035169760 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | QP 345 |
ctrlnum | (OCoLC)231834146 (DE-599)GBV569479142 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02910nam a2200517 c 4500</leader><controlfield tag="001">BV035169760</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090221 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">081119s2009 a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008023192</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159904708X</subfield><subfield code="c">hbk</subfield><subfield code="9">1-599-04708-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781599047089</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-599-04708-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)231834146</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV569479142</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wang, Yun</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Statistical techniques for network security</subfield><subfield code="b">modern statistically-based intrusion detection and protection</subfield><subfield code="c">Yun Wang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 461 p.</subfield><subfield code="b">ill</subfield><subfield code="c">27 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Premier reference source"--Cover. - Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"This book aims to provide a guide for applying modern statistical techniques for intrusion detection and prevention, and serve as a reference for individuals such as network administrators, information and network security specialists, IT professionals, IT-related risk analysis and management professionals, and students and researchers who are interested in the use of statistical techniques for network security"--Provided by publisher</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">"This book aims to provide a guide for applying modern statistical techniques for intrusion detection and prevention, and serve as a reference for individuals such as network administrators, information and network security specialists, IT professionals, IT-related risk analysis and management professionals, and students and researchers who are interested in the use of statistical techniques for network security"--Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Statistik</subfield><subfield code="0">(DE-588)4056995-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Statistik</subfield><subfield code="0">(DE-588)4056995-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">1-599-04710-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-599-04710-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016976720&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016976720</subfield></datafield></record></collection> |
id | DE-604.BV035169760 |
illustrated | Illustrated |
index_date | 2024-07-02T22:53:51Z |
indexdate | 2024-07-09T21:26:35Z |
institution | BVB |
isbn | 159904708X 9781599047089 |
language | English |
lccn | 2008023192 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016976720 |
oclc_num | 231834146 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | xii, 461 p. ill 27 cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Information Science Reference |
record_format | marc |
spelling | Wang, Yun Verfasser aut Statistical techniques for network security modern statistically-based intrusion detection and protection Yun Wang Hershey ; New York Information Science Reference 2009 xii, 461 p. ill 27 cm txt rdacontent n rdamedia nc rdacarrier "Premier reference source"--Cover. - Includes bibliographical references and index "This book aims to provide a guide for applying modern statistical techniques for intrusion detection and prevention, and serve as a reference for individuals such as network administrators, information and network security specialists, IT professionals, IT-related risk analysis and management professionals, and students and researchers who are interested in the use of statistical techniques for network security"--Provided by publisher Computer networks / Security measures Computer security Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd rswk-swf Statistik (DE-588)4056995-0 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Eindringerkennung (DE-588)4706627-1 s Statistik (DE-588)4056995-0 s DE-604 Erscheint auch als Online-Ausgabe 1-599-04710-1 Erscheint auch als Online-Ausgabe 978-1-599-04710-2 Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016976720&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Wang, Yun Statistical techniques for network security modern statistically-based intrusion detection and protection Computer networks / Security measures Computer security Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd Statistik (DE-588)4056995-0 gnd Eindringerkennung (DE-588)4706627-1 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4056995-0 (DE-588)4706627-1 |
title | Statistical techniques for network security modern statistically-based intrusion detection and protection |
title_auth | Statistical techniques for network security modern statistically-based intrusion detection and protection |
title_exact_search | Statistical techniques for network security modern statistically-based intrusion detection and protection |
title_exact_search_txtP | Statistical techniques for network security modern statistically-based intrusion detection and protection |
title_full | Statistical techniques for network security modern statistically-based intrusion detection and protection Yun Wang |
title_fullStr | Statistical techniques for network security modern statistically-based intrusion detection and protection Yun Wang |
title_full_unstemmed | Statistical techniques for network security modern statistically-based intrusion detection and protection Yun Wang |
title_short | Statistical techniques for network security |
title_sort | statistical techniques for network security modern statistically based intrusion detection and protection |
title_sub | modern statistically-based intrusion detection and protection |
topic | Computer networks / Security measures Computer security Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd Statistik (DE-588)4056995-0 gnd Eindringerkennung (DE-588)4706627-1 gnd |
topic_facet | Computer networks / Security measures Computer security Computer networks Security measures Rechnernetz Statistik Eindringerkennung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016976720&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wangyun statisticaltechniquesfornetworksecuritymodernstatisticallybasedintrusiondetectionandprotection |