Overview
- Addresses the timely topic of computer security
- Self-contained and assumes no expertise in computer security or statistics
- Accessible to computer scientists, computer security professionals, and statisticians
- Includes supplementary material: sn.pub/extras
Part of the book series: Information Science and Statistics (ISS)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (7 chapters)
-
Networking Basics
-
Intrusion Detection
-
Viruses and Other Creatures
Keywords
About this book
Reviews
From the reviews:
TECHNOMETRICS
"After reading this book…I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this area…This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible."
SHORT BOOK REVIEWS
"The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance."
ISI Short Book Reviews, April 2002
"This book is a very good text on intrusion detection, written by an author who has direct practical experience … . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. … the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example … of interdisciplinarity, which is necessary in fields so complex as computer security." (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002)
"This book is about one of those areas that provides rich opportunities for statisticians … . The tools for computer intrusion detection are essentially statistical … . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many realexamples … . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance." (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002)
Authors and Affiliations
Bibliographic Information
Book Title: Computer Intrusion Detection and Network Monitoring
Book Subtitle: A Statistical Viewpoint
Authors: David J. Marchette
Series Title: Information Science and Statistics
DOI: https://doi.org/10.1007/978-1-4757-3458-4
Publisher: Springer New York, NY
-
eBook Packages: Springer Book Archive
Copyright Information: Springer Science+Business Media New York 2001
Hardcover ISBN: 978-0-387-95281-9Published: 26 June 2001
Softcover ISBN: 978-1-4419-2937-2Published: 21 September 2011
eBook ISBN: 978-1-4757-3458-4Published: 17 April 2013
Series ISSN: 1613-9011
Series E-ISSN: 2197-4128
Edition Number: 1
Number of Pages: XVII, 333
Topics: Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences, Probability Theory and Stochastic Processes, Cryptology, Computer Communication Networks, Information Storage and Retrieval, Pattern Recognition