000 04619nam a22005175i 4500
001 978-981-16-8325-1
003 DE-He213
005 20240423125516.0
007 cr nn 008mamaa
008 211215s2022 si | s |||| 0|eng d
020 _a9789811683251
_9978-981-16-8325-1
024 7 _a10.1007/978-981-16-8325-1
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aXu, Kuai.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aNetwork Behavior Analysis
_h[electronic resource] :
_bMeasurement, Models, and Applications /
_cby Kuai Xu.
250 _a1st ed. 2022.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2022.
300 _aXI, 163 p. 66 illus., 59 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1: Introduction -- Chapter 2: Background of Network Behavior Modeling and Analysis -- Chapter 3: Behavior Modeling of Network Traffic -- Chapter 4: Structural Modeling of Network Traffic -- Chapter 5: Graphic Modeling of Network Traffic -- Chapter 6: Real-Time Network Behavior Analysis -- Chapter 7: Applications -- Chapter 8: Research Frontiers of Network Behavior Analysis.
520 _aThis book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet “objects” such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks. The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections. The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications.
650 0 _aComputer networks .
650 0 _aData mining.
650 0 _aComputer science.
650 1 4 _aComputer Communication Networks.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aComputer Science.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811683244
776 0 8 _iPrinted edition:
_z9789811683268
776 0 8 _iPrinted edition:
_z9789811683275
856 4 0 _uhttps://doi.org/10.1007/978-981-16-8325-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c178698
_d178698