Data analysis for network cyber-security:
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyz...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
London
Imperial College Press
c2014
|
Schlagworte: | |
Online-Zugang: | FHN01 URL des Erstveroeffentlichers |
Zusammenfassung: | There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research |
Beschreibung: | ix, 189 p. ill. (some col.) |
ISBN: | 9781783263752 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044633048 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 171120s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781783263752 |9 978-1-78326-375-2 | ||
024 | 7 | |a 10.1142/P919 |2 doi | |
035 | |a (ZDB-124-WOP)00005781 | ||
035 | |a (OCoLC)988734883 | ||
035 | |a (DE-599)BVBBV044633048 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-92 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Data analysis for network cyber-security |c editors, Niall Adams, Nicholas Heard |
264 | 1 | |a London |b Imperial College Press |c c2014 | |
300 | |a ix, 189 p. |b ill. (some col.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Communication / Network analysis | |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Adams, Niall M. |d 1968- |e Sonstige |4 oth | |
700 | 1 | |a Heard, Nicholas |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781783263745 |
856 | 4 | 0 | |u http://www.worldscientific.com/worldscibooks/10.1142/P919#t=toc |x Verlag |z URL des Erstveroeffentlichers |3 Volltext |
912 | |a ZDB-124-WOP | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030031020 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.worldscientific.com/worldscibooks/10.1142/P919#t=toc |l FHN01 |p ZDB-124-WOP |q FHN_PDA_WOP |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178043130871808 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV044633048 |
classification_rvk | ST 277 |
collection | ZDB-124-WOP |
ctrlnum | (ZDB-124-WOP)00005781 (OCoLC)988734883 (DE-599)BVBBV044633048 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02820nmm a2200421zc 4500</leader><controlfield tag="001">BV044633048</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">171120s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783263752</subfield><subfield code="9">978-1-78326-375-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1142/P919</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-124-WOP)00005781</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)988734883</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044633048</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data analysis for network cyber-security</subfield><subfield code="c">editors, Niall Adams, Nicholas Heard</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Imperial College Press</subfield><subfield code="c">c2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">ix, 189 p.</subfield><subfield code="b">ill. (some col.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communication / Network analysis</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Adams, Niall M.</subfield><subfield code="d">1968-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Heard, Nicholas</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781783263745</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.worldscientific.com/worldscibooks/10.1142/P919#t=toc</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveroeffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-124-WOP</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030031020</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.worldscientific.com/worldscibooks/10.1142/P919#t=toc</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-124-WOP</subfield><subfield code="q">FHN_PDA_WOP</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV044633048 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:57:41Z |
institution | BVB |
isbn | 9781783263752 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030031020 |
oclc_num | 988734883 |
open_access_boolean | |
owner | DE-92 |
owner_facet | DE-92 |
physical | ix, 189 p. ill. (some col.) |
psigel | ZDB-124-WOP ZDB-124-WOP FHN_PDA_WOP |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Imperial College Press |
record_format | marc |
spelling | Data analysis for network cyber-security editors, Niall Adams, Nicholas Heard London Imperial College Press c2014 ix, 189 p. ill. (some col.) txt rdacontent c rdamedia cr rdacarrier There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research Computer networks / Security measures Communication / Network analysis 1\p (DE-588)1071861417 Konferenzschrift gnd-content Adams, Niall M. 1968- Sonstige oth Heard, Nicholas Sonstige oth Erscheint auch als Druck-Ausgabe 9781783263745 http://www.worldscientific.com/worldscibooks/10.1142/P919#t=toc Verlag URL des Erstveroeffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Data analysis for network cyber-security Computer networks / Security measures Communication / Network analysis |
subject_GND | (DE-588)1071861417 |
title | Data analysis for network cyber-security |
title_auth | Data analysis for network cyber-security |
title_exact_search | Data analysis for network cyber-security |
title_full | Data analysis for network cyber-security editors, Niall Adams, Nicholas Heard |
title_fullStr | Data analysis for network cyber-security editors, Niall Adams, Nicholas Heard |
title_full_unstemmed | Data analysis for network cyber-security editors, Niall Adams, Nicholas Heard |
title_short | Data analysis for network cyber-security |
title_sort | data analysis for network cyber security |
topic | Computer networks / Security measures Communication / Network analysis |
topic_facet | Computer networks / Security measures Communication / Network analysis Konferenzschrift |
url | http://www.worldscientific.com/worldscibooks/10.1142/P919#t=toc |
work_keys_str_mv | AT adamsniallm dataanalysisfornetworkcybersecurity AT heardnicholas dataanalysisfornetworkcybersecurity |