Articles liés à Encrypted Network Traffic Analysis

Encrypted Network Traffic Analysis - Couverture souple

 
9783031629082: Encrypted Network Traffic Analysis

Synopsis

This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic.  The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies.

The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection.

Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

À propos de l?auteur

Dr. Aswani Kumar Cherukuri is a Professor (Higher Academic Grade) of School of Computer Science Engineering & Information Systems, Vellore Institute of Technology, Vellore, India. His research interests are machine learning, information security and quantum computing. In particular, his work is focused on encrypted network traffic analysis, machine learning techniques. Also, he has interests in post quantum cryptography. He published more than 190 research papers and has 4100+ citations and h-index of 31 as per Google scholar. He executed as principal investigator, different research projects of worth 10 million USD from various funding agencies of India. He has guided 8 PhD research scholars and few foreign interns. He has received awards including Young Scientist Fellowship, Inspiring Teacher Award, Educator excellence award, etc. He is editorial board member of several international journals. He is a member of IEEE, Senior Member of ACM, Vice Chair of IEEE Educational Taskforce on Datamining.

Dr. Sumaiya Thaseen Ikram is an Associate Professor (Senior) in the School of Computer Science and Information Systems in Vellore Institute of Technology, Vellore with 18 years of teaching and research experience. She has expertise in Cryptography, Network Security, Software Security, Intrusion Detection Systems, Artificial Intelligence, Image Processing, Ethical hacking, Vulnerability Assessment and Penetration Testing. She has 1400+ citations and h-index of 15 in google scholar and most of her research works are published in high impact factor journals. She is a reviewer for many journals of Wiley, Elsevier, and Springer publishers. She is a certified ethical hacker, certified penetration testing engineer and certified computer hacking forensic investigator. She has successfully completed a research project as a Co-PI funded by MHRD worth Rs.63 lakhs between 2019-2023 in collaboration with Deakin University, Australia. She also completed a consultancy project worth Rs.6 lakhs in the domain of full stack development in the year 2022. She has delivered many expert talks in the domain of Intrusion detection Systems in Taylors University, Malaysia and Deakin University, Australia.

Dr. Gang Li is the university academic board member and full professor at Deakin University, and he is the AI director in the Strategic Research Center of Cyber Resilience and Trust (CREST). His research includes data mining, privacy preservation, group behavior analysis and business intelligence. He holds one international patent, and he has co-authored nine papers that won best paper prizes, including Springer's Journal of IT & Tourism best paper award in 2023, KSEM 2018 best paper award, IFITT Journal Paper of the Year 2018/2015, ACM/IEEE ASONAM2012 best paper award, the 2008 Nightingale Prize by Springer, etc.

Dr. Xiao Liu received his bachelor's and master's degrees in information management and information system from the School of Management, Hefei University of Technology, Hefei, China, in 2004 and 2007, respectively, and his Ph.D. degree in computer science and software engineering from the Faculty of Information and Communication Technologies, Swinburne University of Technology, Melbourne, Australia, in 2011. He was an Associate Professor at the Software Engineering Institute, East China Normal University, Shanghai, China, during 2013 to 2015. He is currently an Associate Professor and Director for the Software Engineering Innovation Lab with the School of Information Technology, Deakin University, Australia. His research interests include workflow systems, cloud and edge computing, big data analytics, social network, and human-centric software engineering. He is a Senior Member of ACM and IEEE.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

Acheter neuf

Afficher cet article
EUR 48,37

Autre devise

EUR 9,70 expédition depuis Allemagne vers France

Destinations, frais et délais

Résultats de recherche pour Encrypted Network Traffic Analysis

Image fournie par le vendeur

Cherukuri, Aswani Kumar|Ikram, Sumaiya Thaseen|Li, Gang|Liu, Xiao
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Couverture souple

Vendeur : moluna, Greven, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 1658771452

Contacter le vendeur

Acheter neuf

EUR 48,37
Autre devise
Frais de port : EUR 9,70
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Cherukuri, Aswani Kumar; Ikram, Sumaiya Thaseen; Li, Gang; Liu, Xiao
Edité par Springer, 2024
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Couverture souple

Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. In. N° de réf. du vendeur ria9783031629082_new

Contacter le vendeur

Acheter neuf

EUR 58,76
Autre devise
Frais de port : EUR 4,60
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Aswani Kumar Cherukuri
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Taschenbuch

Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies.The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection.Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource. N° de réf. du vendeur 9783031629082

Contacter le vendeur

Acheter neuf

EUR 53,49
Autre devise
Frais de port : EUR 10,99
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Aswani Kumar Cherukuri
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Taschenbuch
impression à la demande

Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies.The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection.Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource. 101 pp. Englisch. N° de réf. du vendeur 9783031629082

Contacter le vendeur

Acheter neuf

EUR 53,49
Autre devise
Frais de port : EUR 11
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Aswani Kumar Cherukuri
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Taschenbuch

Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. Neuware -This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies.The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection.Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 112 pp. Englisch. N° de réf. du vendeur 9783031629082

Contacter le vendeur

Acheter neuf

EUR 53,49
Autre devise
Frais de port : EUR 15
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

Image d'archives

Cherukuri, Aswani Kumar; Ikram, Sumaiya Thaseen; Li, Gang; Liu, Xiao
Edité par Springer, 2024
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Couverture souple

Vendeur : California Books, Miami, FL, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur I-9783031629082

Contacter le vendeur

Acheter neuf

EUR 70,20
Autre devise
Frais de port : EUR 6,82
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Cherukuri, Aswani Kumar; Ikram, Sumaiya Thaseen; Li, Gang; Liu, Xiao
Edité par Springer, 2024
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Couverture souple

Vendeur : Books Puddle, New York, NY, Etats-Unis

Évaluation du vendeur 4 sur 5 étoiles Evaluation 4 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. 2024th edition NO-PA16APR2015-KAP. N° de réf. du vendeur 26401675689

Contacter le vendeur

Acheter neuf

EUR 74,60
Autre devise
Frais de port : EUR 7,67
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : 4 disponible(s)

Ajouter au panier

Image d'archives

Cherukuri, Aswani Kumar; Ikram, Sumaiya Thaseen; Li, Gang; Liu, Xiao
Edité par Springer, 2024
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Couverture souple
impression à la demande

Vendeur : Majestic Books, Hounslow, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. Print on Demand. N° de réf. du vendeur 394701430

Contacter le vendeur

Acheter neuf

EUR 77,51
Autre devise
Frais de port : EUR 10,19
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : 4 disponible(s)

Ajouter au panier

Image d'archives

Cherukuri, Aswani Kumar; Ikram, Sumaiya Thaseen; Li, Gang; Liu, Xiao
Edité par Springer, 2024
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Couverture souple
impression à la demande

Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18401675683

Contacter le vendeur

Acheter neuf

EUR 80,62
Autre devise
Frais de port : EUR 7,95
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 4 disponible(s)

Ajouter au panier

Image d'archives

Cherukuri, Aswani Kumar/ Ikram, Sumaiya Thaseen/ Li, Gang/ Liu, Xiao
Edité par Springer-Nature New York Inc, 2024
ISBN 10 : 3031629086 ISBN 13 : 9783031629082
Neuf Paperback

Vendeur : Revaluation Books, Exeter, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback. Etat : Brand New. 111 pages. 9.25x6.10x9.21 inches. In Stock. N° de réf. du vendeur x-3031629086

Contacter le vendeur

Acheter neuf

EUR 81,71
Autre devise
Frais de port : EUR 11,52
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

There are 3 autres exemplaires de ce livre sont disponibles

Afficher tous les résultats pour ce livre