000 03423nam a22005295i 4500
001 978-981-15-6575-5
003 DE-He213
005 20240423125231.0
007 cr nn 008mamaa
008 200915s2020 si | s |||| 0|eng d
020 _a9789811565755
_9978-981-15-6575-5
024 7 _a10.1007/978-981-15-6575-5
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aMa, Yuxiang.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aAccountability and Privacy in Network Security
_h[electronic resource] /
_cby Yuxiang Ma, Yulei Wu, Jingguo Ge.
250 _a1st ed. 2020.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2020.
300 _aXII, 140 p. 62 illus., 59 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- A Comprehensive Survey -- Encrypted Traffic Classification -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary.
520 _aThis book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
650 0 _aComputer networks .
650 0 _aData protection.
650 0 _aElectronic digital computers
_xEvaluation.
650 1 4 _aComputer Communication Networks.
650 2 4 _aData and Information Security.
650 2 4 _aSystem Performance and Evaluation.
700 1 _aWu, Yulei.
_eauthor.
_0(orcid)0000-0003-0801-8443
_1https://orcid.org/0000-0003-0801-8443
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aGe, Jingguo.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811565748
776 0 8 _iPrinted edition:
_z9789811565762
856 4 0 _uhttps://doi.org/10.1007/978-981-15-6575-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c175706
_d175706