001443309 000__ 04697cam\a2200529Ia\4500 001443309 001__ 1443309 001443309 003__ OCoLC 001443309 005__ 20230310003537.0 001443309 006__ m\\\\\o\\d\\\\\\\\ 001443309 007__ cr\un\nnnunnun 001443309 008__ 211218s2022\\\\si\\\\\\ob\\\\000\0\eng\d 001443309 019__ $$a1288963512$$a1289254947$$a1289338637$$a1289365440$$a1289442425$$a1289480639$$a1291720132$$a1294350207$$a1296665738 001443309 020__ $$a9789811683251$$q(electronic bk.) 001443309 020__ $$a9811683255$$q(electronic bk.) 001443309 020__ $$z9811683247 001443309 020__ $$z9789811683244 001443309 0247_ $$a10.1007/978-981-16-8325-1$$2doi 001443309 035__ $$aSP(OCoLC)1289368542 001443309 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dYDX$$dGW5XE$$dOCLCO$$dDCT$$dOCLCF$$dDKU$$dOCLCO$$dN$T$$dWAU$$dOCLCQ 001443309 049__ $$aISEA 001443309 050_4 $$aTK5105.875.I57 001443309 08204 $$a004.6/2$$223 001443309 1001_ $$aXu, Kuai. 001443309 24510 $$aNetwork behavior analysis :$$bmeasurement, models, and applications /$$cKuai Xu. 001443309 260__ $$aSingapore :$$bSpringer,$$c2022. 001443309 300__ $$a1 online resource (xi, 163 pages) :$$billustrations (chiefly color) 001443309 336__ $$atext$$btxt$$2rdacontent 001443309 337__ $$acomputer$$bc$$2rdamedia 001443309 338__ $$aonline resource$$bcr$$2rdacarrier 001443309 347__ $$atext file$$bPDF$$2rda 001443309 504__ $$aIncludes bibliographical references. 001443309 5050_ $$aIntroduction -- Background of network behavior analysis -- Behavior modeling of network traffic -- Structural modeling of network traffic -- Real-time network behavior analysis -- Applications -- Research frontiers of network behavior analysis. 001443309 506__ $$aAccess limited to authorized users. 001443309 520__ $$aThis book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet objects such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks. The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections. The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications. 001443309 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 19, 2022). 001443309 650_0 $$aInternet$$xManagement. 001443309 650_0 $$aComputer networks$$xManagement. 001443309 650_6 $$aInternet$$xGestion. 001443309 650_6 $$aRéseaux d'ordinateurs$$xGestion. 001443309 655_0 $$aElectronic books. 001443309 77608 $$iPrint version:$$aXu, Kuai$$tNetwork Behavior Analysis$$dSingapore : Springer Singapore Pte. Limited,c2022$$z9789811683244 001443309 852__ $$bebk 001443309 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-16-8325-1$$zOnline Access$$91397441.1 001443309 909CO $$ooai:library.usi.edu:1443309$$pGLOBAL_SET 001443309 980__ $$aBIB 001443309 980__ $$aEBOOK 001443309 982__ $$aEbook 001443309 983__ $$aOnline 001443309 994__ $$a92$$bISE