skip to content
Data analysis for network cyber-security Preview this item
ClosePreview this item
Checking...

Data analysis for network cyber-security

Author: Niall M Adams; Nicholas Heard
Publisher: London, UK : Imperial College Press, [2014] ©2014
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Print version:
Data analysis for network cyber-security
(OCoLC)876338470
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Niall M Adams; Nicholas Heard
ISBN: 9781783263752 178326375X
OCLC Number: 880357363
Description: 1 online resource.
Contents: Ch. 1. Inference for graphs and networks: Adapting classical tools to modern data / Benjamin P. Olding and Patrick J. Wolfe --
ch. 2. Rapid detection of attacks in computer networks by quickest changepoint detection methods / Alexander G. Tartakovsky --
ch. 3. Statistical detection of intruders within computer networks using scan statistics / Joshua Neil [and others] --
ch. 4. Characterizing dynamic group behavior in social networks for cybernetics / Sumeet Dua and Pradeep Chowriappa --
ch. 5. Several approaches for detecting anomalies in network traffic data / Celine Levy-Leduc --
ch. 6. Monitoring a device in a communication network / Nick A. Heard and Melissa J. Turcotte.
Responsibility: Niall Adams & Nicholas Heard, editors.

Abstract:

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/880357363> # Data analysis for network cyber-security
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "880357363" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1892077095#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1892077095#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1892077095#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/1892077095#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2014" ;
    schema:datePublished "2014" ;
    schema:description "There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research."@en ;
    schema:description "Ch. 1. Inference for graphs and networks: Adapting classical tools to modern data / Benjamin P. Olding and Patrick J. Wolfe -- ch. 2. Rapid detection of attacks in computer networks by quickest changepoint detection methods / Alexander G. Tartakovsky -- ch. 3. Statistical detection of intruders within computer networks using scan statistics / Joshua Neil [and others] -- ch. 4. Characterizing dynamic group behavior in social networks for cybernetics / Sumeet Dua and Pradeep Chowriappa -- ch. 5. Several approaches for detecting anomalies in network traffic data / Celine Levy-Leduc -- ch. 6. Monitoring a device in a communication network / Nick A. Heard and Melissa J. Turcotte."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/1892077095#Person/heard_nicholas> ; # Nicholas Heard
    schema:editor <http://experiment.worldcat.org/entity/work/data/1892077095#Person/adams_niall_m_1968> ; # Niall M. Adams
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1892077095> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/876338470> ;
    schema:name "Data analysis for network cyber-security"@en ;
    schema:productID "880357363" ;
    schema:url <http://site.ebrary.com/id/10871771> ;
    schema:url <http://0-search.ebscohost.com.librarycatalog.vts.edu/login.aspx?direct=true&scope=site&db=nlebk&AN=779681> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=779681> ;
    schema:url <http://proxy.library.carleton.ca/login?url=http://site.ebrary.com/lib/oculcarleton/docDetail.action?docID=10871771> ;
    schema:workExample <http://worldcat.org/isbn/9781783263752> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/880357363> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1892077095#Person/adams_niall_m_1968> # Niall M. Adams
    a schema:Person ;
    schema:birthDate "1968" ;
    schema:familyName "Adams" ;
    schema:givenName "Niall M." ;
    schema:name "Niall M. Adams" ;
    .

<http://experiment.worldcat.org/entity/work/data/1892077095#Person/heard_nicholas> # Nicholas Heard
    a schema:Person ;
    schema:familyName "Heard" ;
    schema:givenName "Nicholas" ;
    schema:name "Nicholas Heard" ;
    .

<http://experiment.worldcat.org/entity/work/data/1892077095#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1892077095#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1892077095#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1892077095#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://worldcat.org/isbn/9781783263752>
    a schema:ProductModel ;
    schema:isbn "178326375X" ;
    schema:isbn "9781783263752" ;
    .

<http://www.worldcat.org/oclc/876338470>
    a schema:CreativeWork ;
    rdfs:label "Data analysis for network cyber-security" ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/880357363> ; # Data analysis for network cyber-security
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.