Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Network Traffic Anomaly Detection and Prevention

Best Price (Coupon Required):
Buy Network Traffic Anomaly Detection and Prevention for $45.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $49.99 - $49.99
BEST PRICE

Single Product Purchase

$45.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$49.99 $49.99

10% OFF
This deals requires coupon
$45.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783319651866
Condition
New
Product Description

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools; discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality; reviews open issues and challenges in network traffic anomaly detection and prevention. This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Higher Education in the Era of the Fourth Industrial Revolution

Higher Education in the Era of the Fourth Industrial Revolution

$31.00
Archetypisches Storytelling in Videospielen

Archetypisches Storytelling in Videospielen

$17.99
Arbeitsbuch zur mikrokonomischen Theorie

Arbeitsbuch zur mikrokonomischen Theorie

$39.99
Herder-Bibliographie 1977-1992

Herder-Bibliographie 1977-1992

$139.00
Mineralogical Analysis Applied to Forensics

Mineralogical Analysis Applied to Forensics

$139.99
Umweltkonomik, Umweltpolitik und Marktwirtschaft

Umweltkonomik, Umweltpolitik und Marktwirtschaft

$44.99
Human Recognition at a Distance in Video

Human Recognition at a Distance in Video

$84.99
Rechnungslegung, Steuern, Corporate Governance, Wirtschaftsprfung und Controlling

Rechnungslegung, Steuern, Corporate Governance, Wirtschaftsprfung und Controlling

$159.99
Warenwirtschaftssysteme mit Bildschirmtext

Warenwirtschaftssysteme mit Bildschirmtext

$69.99
Instability Constants of Complex Compounds

Instability Constants of Complex Compounds

$39.99
Conceptual Modeling: Foundations and Applications

Conceptual Modeling: Foundations and Applications

$54.99
Kinderflchtlinge

Kinderflchtlinge

$49.99
Neuroimmunology

Neuroimmunology

$109.99
The Rhizosphere and Plant Growth

The Rhizosphere and Plant Growth

$219.99
Peptides for the New Millennium

Peptides for the New Millennium

$259.00
Grundprinzipien der Mechatronik

Grundprinzipien der Mechatronik

$44.99
John Paul II's Contribution to Catholic Bioethics

John Paul II's Contribution to Catholic Bioethics

$109.99
American Catholicism

American Catholicism

$54.99
Semiotic Sociology

Semiotic Sociology

$119.99
Proof Theory and Algebra in Logic

Proof Theory and Algebra in Logic

$44.99
Soziologie als Synthese

Soziologie als Synthese

$74.99
Distributed Computing

Distributed Computing

$39.99
Dealing with Conceptualisations of Learning

Dealing with Conceptualisations of Learning

$39.99
Das japanische Unternehmen

Das japanische Unternehmen

$59.99
Solar Cells: An Introduction to Crystalline Photovoltaic Technology

Solar Cells: An Introduction to Crystalline Photovoltaic Technology

$54.99
Raising Heirs to the Throne in Nineteenth-Century Spain

Raising Heirs to the Throne in Nineteenth-Century Spain

$99.99
Marketing and Smart Technologies

Marketing and Smart Technologies

$329.99
Uric Acid

Uric Acid

$109.99
Fiber Reinforced Polymeric Materials and Sustainable Structures

Fiber Reinforced Polymeric Materials and Sustainable Structures

$139.00
Insect conservation and Australias Inland Waters

Insect conservation and Australias Inland Waters

$109.99
Graphene-Bearing Polymer Composites

Graphene-Bearing Polymer Composites

$159.99
Client/Server-Technologie in der Unternehmenspraxis

Client/Server-Technologie in der Unternehmenspraxis

$39.99
Securitization and the Global Economy

Securitization and the Global Economy

$129.99
Composite Systems Decisions

Composite Systems Decisions

$129.00
Mathematical and Computational Aspects

Mathematical and Computational Aspects

$84.99
Mathematical and Statistical Methods for Actuarial Sciences and Finance

Mathematical and Statistical Methods for Actuarial Sciences and Finance

$59.99
Fifth Generation Computer Systems 1988

Fifth Generation Computer Systems 1988

$54.99
Maximilian Voloshins Poetic Legacy and the Post-Soviet Russian Identity

Maximilian Voloshins Poetic Legacy and the Post-Soviet Russian Identity

$119.99
Symmetrische Verschlsselungsverfahren

Symmetrische Verschlsselungsverfahren

$44.99
Locational Preferences of Entrepreneurs

Locational Preferences of Entrepreneurs

$54.99
previous
next