Cantitate/Preț
Produs

Traffic Anomaly Detection

Autor Antonio Cuadra-Sánchez, Javier Aracil
en Limba Engleză Hardback – 30 oct 2015
Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic.
As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".


  • A new information-theory based technique for traffic anomaly detection (typical day analysis)
  • Introductory chapters to anomaly detection methods including control charts, tests of goodness-of-fit Mutual Information
  • Contains comparative analysis of traffic anomaly detection methods
Citește tot Restrânge

Preț: 31109 lei

Preț vechi: 38887 lei
-20%

Puncte Express: 467

Preț estimativ în valută:
5504 6489$ 4780£

Carte tipărită la comandă

Livrare economică 16-30 martie


Specificații

ISBN-13: 9781785480126
ISBN-10: 178548012X
Pagini: 70
Ilustrații: black & white illustrations
Dimensiuni: 152 x 229 x 9 mm
Greutate: 0.28 kg
Editura: ELSEVIER SCIENCE

Public țintă

Scientific and Engineering communities working on Anomaly detection in the context of Network Security. In particular, early researchers, post-docs and engineers with an interest in this field.

Cuprins

1. Theoretical anomaly detection methods. Set of algorithms proposed for this analysis: the most used SCC (CUSUM), the two main tests of goodness-of-fit and Mutual Information.2. Finding the optimal aggregation period for a time series of Internet traffic3. Comparative analysis of traffic anomaly detection methods4. Proposal of a new information-theory based technique (typical day analysis)5. Conclusions

Recenzii

"...their focus is on the theoretical aspects of determining anomalous traffic...it’s bound to be of interest to those developing security solutions." --Network Security