Data analysis for network cyber-security:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London, UK
Imperial College Press
[2014]
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Description based on print version record |
Beschreibung: | 1 online resource |
ISBN: | 1783263741 178326375X 9781783263745 9781783263752 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043037150 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2014 |||| o||u| ||||||eng d | ||
020 | |a 1783263741 |9 1-78326-374-1 | ||
020 | |a 178326375X |c electronic bk. |9 1-78326-375-X | ||
020 | |a 9781783263745 |9 978-1-78326-374-5 | ||
020 | |a 9781783263752 |c electronic bk. |9 978-1-78326-375-2 | ||
035 | |a (OCoLC)880357363 | ||
035 | |a (DE-599)BVBBV043037150 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Data analysis for network cyber-security |c Niall Adams & Nicholas Heard, editors |
264 | 1 | |a London, UK |b Imperial College Press |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on print version record | ||
505 | 8 | |a Ch. 1. Inference for graphs and networks: Adapting classical tools to modern data / Benjamin P. Olding and Patrick J. Wolfe -- ch. 2. Rapid detection of attacks in computer networks by quickest changepoint detection methods / Alexander G. Tartakovsky -- ch. 3. Statistical detection of intruders within computer networks using scan statistics / Joshua Neil ... [et al.] -- ch. 4. Characterizing dynamic group behavior in social networks for cybernetics / Sumeet Dua and Pradeep Chowriappa -- ch. 5. Several approaches for detecting anomalies in network traffic data / Celine Levy-Leduc -- ch. 6. Monitoring a device in a communication network / Nick A. Heard and Melissa J. Turcotte | |
505 | 8 | |a There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures |v Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Adams, Niall M. |d 1968- |4 edt | |
700 | 1 | |a Heard, Nicholas |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Data analysis for network cyber-security |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=779681 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028461798 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=779681 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=779681 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175398216400896 |
---|---|
any_adam_object | |
author2 | Adams, Niall M. 1968- Heard, Nicholas |
author2_role | edt edt |
author2_variant | n m a nm nma n h nh |
author_facet | Adams, Niall M. 1968- Heard, Nicholas |
building | Verbundindex |
bvnumber | BV043037150 |
collection | ZDB-4-EBA |
contents | Ch. 1. Inference for graphs and networks: Adapting classical tools to modern data / Benjamin P. Olding and Patrick J. Wolfe -- ch. 2. Rapid detection of attacks in computer networks by quickest changepoint detection methods / Alexander G. Tartakovsky -- ch. 3. Statistical detection of intruders within computer networks using scan statistics / Joshua Neil ... [et al.] -- ch. 4. Characterizing dynamic group behavior in social networks for cybernetics / Sumeet Dua and Pradeep Chowriappa -- ch. 5. Several approaches for detecting anomalies in network traffic data / Celine Levy-Leduc -- ch. 6. Monitoring a device in a communication network / Nick A. Heard and Melissa J. Turcotte There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research |
ctrlnum | (OCoLC)880357363 (DE-599)BVBBV043037150 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03948nmm a2200493zc 4500</leader><controlfield tag="001">BV043037150</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783263741</subfield><subfield code="9">1-78326-374-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178326375X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78326-375-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783263745</subfield><subfield code="9">978-1-78326-374-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783263752</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78326-375-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)880357363</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043037150</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data analysis for network cyber-security</subfield><subfield code="c">Niall Adams & Nicholas Heard, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London, UK</subfield><subfield code="b">Imperial College Press</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Ch. 1. Inference for graphs and networks: Adapting classical tools to modern data / Benjamin P. Olding and Patrick J. Wolfe -- ch. 2. Rapid detection of attacks in computer networks by quickest changepoint detection methods / Alexander G. Tartakovsky -- ch. 3. Statistical detection of intruders within computer networks using scan statistics / Joshua Neil ... [et al.] -- ch. 4. Characterizing dynamic group behavior in social networks for cybernetics / Sumeet Dua and Pradeep Chowriappa -- ch. 5. Several approaches for detecting anomalies in network traffic data / Celine Levy-Leduc -- ch. 6. Monitoring a device in a communication network / Nick A. Heard and Melissa J. Turcotte</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Adams, Niall M.</subfield><subfield code="d">1968-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Heard, Nicholas</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Data analysis for network cyber-security</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=779681</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028461798</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=779681</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=779681</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043037150 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:39Z |
institution | BVB |
isbn | 1783263741 178326375X 9781783263745 9781783263752 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028461798 |
oclc_num | 880357363 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Imperial College Press |
record_format | marc |
spelling | Data analysis for network cyber-security Niall Adams & Nicholas Heard, editors London, UK Imperial College Press [2014] © 2014 1 online resource txt rdacontent c rdamedia cr rdacarrier Description based on print version record Ch. 1. Inference for graphs and networks: Adapting classical tools to modern data / Benjamin P. Olding and Patrick J. Wolfe -- ch. 2. Rapid detection of attacks in computer networks by quickest changepoint detection methods / Alexander G. Tartakovsky -- ch. 3. Statistical detection of intruders within computer networks using scan statistics / Joshua Neil ... [et al.] -- ch. 4. Characterizing dynamic group behavior in social networks for cybernetics / Sumeet Dua and Pradeep Chowriappa -- ch. 5. Several approaches for detecting anomalies in network traffic data / Celine Levy-Leduc -- ch. 6. Monitoring a device in a communication network / Nick A. Heard and Melissa J. Turcotte There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures Congresses (DE-588)1071861417 Konferenzschrift gnd-content Adams, Niall M. 1968- edt Heard, Nicholas edt Erscheint auch als Druck-Ausgabe Data analysis for network cyber-security http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=779681 Aggregator Volltext |
spellingShingle | Data analysis for network cyber-security Ch. 1. Inference for graphs and networks: Adapting classical tools to modern data / Benjamin P. Olding and Patrick J. Wolfe -- ch. 2. Rapid detection of attacks in computer networks by quickest changepoint detection methods / Alexander G. Tartakovsky -- ch. 3. Statistical detection of intruders within computer networks using scan statistics / Joshua Neil ... [et al.] -- ch. 4. Characterizing dynamic group behavior in social networks for cybernetics / Sumeet Dua and Pradeep Chowriappa -- ch. 5. Several approaches for detecting anomalies in network traffic data / Celine Levy-Leduc -- ch. 6. Monitoring a device in a communication network / Nick A. Heard and Melissa J. Turcotte There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures Congresses |
subject_GND | (DE-588)1071861417 |
title | Data analysis for network cyber-security |
title_auth | Data analysis for network cyber-security |
title_exact_search | Data analysis for network cyber-security |
title_full | Data analysis for network cyber-security Niall Adams & Nicholas Heard, editors |
title_fullStr | Data analysis for network cyber-security Niall Adams & Nicholas Heard, editors |
title_full_unstemmed | Data analysis for network cyber-security Niall Adams & Nicholas Heard, editors |
title_short | Data analysis for network cyber-security |
title_sort | data analysis for network cyber security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures Congresses |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer networks Security measures Congresses Konferenzschrift |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=779681 |
work_keys_str_mv | AT adamsniallm dataanalysisfornetworkcybersecurity AT heardnicholas dataanalysisfornetworkcybersecurity |