Se ordini entro 17 ore e 37 minuti, consegna garantita in 48 ore lavorative
scegliendo le spedizioni Express
Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies.
The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection.
Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.
Preface.- Acknowledgement.- Chapter 1 Introduction.- Chapter 2 Encrypted Network Traffic Analysis.- Chapter 3 Classification of Encrypted Network Traffic.- Chapter 4 Detection of Anomalous Encrypted Traffic.- Chapter 5 AI based Approaches for Anomaly Detection.
Dr. Aswani Kumar Cherukuri is a Professor (Higher Academic Grade) of School of Computer Science Engineering & Information Systems, Vellore Institute of Technology, Vellore, India. His research interests are machine learning, information security and quantum computing. In particular, his work is focused on encrypted network traffic analysis, machine learning techniques. Also, he has interests in post quantum cryptography. He published more than 190 research papers and has 4100+ citations and h-index of 31 as per Google scholar. He executed as principal investigator, different research projects of worth 10 million USD from various funding agencies of India. He has guided 8 PhD research scholars and few foreign interns. He has received awards including Young Scientist Fellowship, Inspiring Teacher Award, Educator excellence award, etc. He is editorial board member of several international journals. He is a member of IEEE, Senior Member of ACM, Vice Chair of IEEE Educational Taskforce on Datamining.
Dr. Sumaiya Thaseen Ikram is an Associate Professor (Senior) in the School of Computer Science and Information Systems in Vellore Institute of Technology, Vellore with 18 years of teaching and research experience. She has expertise in Cryptography, Network Security, Software Security, Intrusion Detection Systems, Artificial Intelligence, Image Processing, Ethical hacking, Vulnerability Assessment and Penetration Testing. She has 1400+ citations and h-index of 15 in google scholar and most of her research works are published in high impact factor journals. She is a reviewer for many journals of Wiley, Elsevier, and Springer publishers. She is a certified ethical hacker, certified penetration testing engineer and certified computer hacking forensic investigator. She has successfully completed a research project as a Co-PI funded by MHRD worth Rs.63 lakhs between 2019-2023 in collaboration with Deakin University, Australia. She also completed a consultancy project worth Rs.6 lakhs in the domain of full stack development in the year 2022. She has delivered many expert talks in the domain of Intrusion detection Systems in Taylors University, Malaysia and Deakin University, Australia.
Dr. Gang Li is the university academic board member and full professor at Deakin University, and he is the AI director in the Strategic Research Center of Cyber Resilience and Trust (CREST). His research includes data mining, privacy preservation, group behavior analysis and business intelligence. He holds one international patent, and he has co-authored nine papers that won best paper prizes, including Springer's Journal of IT & Tourism best paper award in 2023, KSEM 2018 best paper award, IFITT Journal Paper of the Year 2018/2015, ACM/IEEE ASONAM2012 best paper award, the 2008 Nightingale Prize by Springer, etc.
Dr. Xiao Liu received his bachelor's and master's degrees in information management and information system from the School of Management, Hefei University of Technology, Hefei, China, in 2004 and 2007, respectively, and his Ph.D. degree in computer science and software engineering from the Faculty of Information and Communication Technologies, Swinburne University of Technology, Melbourne, Australia, in 2011. He was an Associate Professor at the Software Engineering Institute, East China Normal University, Shanghai, China, during 2013 to 2015. He is currently an Associate Professor and Director for the Software Engineering Innovation Lab with the School of Information Technology, Deakin University, Australia. His research interests include workflow systems, cloud and edge computing, big data analytics, social network, and human-centric software engineering. He is a Senior Member of ACM and IEEE.
Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.