Encrypted Network Traffic Analysis

Cherukuri, Aswani Kumar, Ikram, Sumaiya Thaseen, Li, Gang

  • 出版商: Springer
  • 出版日期: 2024-07-25
  • 售價: $2,470
  • 貴賓價: 9.5$2,347
  • 語言: 英文
  • 頁數: 99
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 3031629086
  • ISBN-13: 9783031629082
  • 海外代購書籍(需單獨結帳)

商品描述

This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies.

The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection.

Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.

商品描述(中文翻譯)

本書提供了對加密網路流量來源的詳細研究,以及分析、分類和檢測加密流量的方法和技術。作者在前五章中提供了有關加密網路流量、協議和加密網路流量應用的研究結果和目標。作者還分析了加密網路流量所面臨的挑戰和問題。本書系統性地介紹了加密流量的分析和分類,以及檢測加密流量異常的方法。傳統的加密流量處理方法,如深度封包檢查和基於流量的方法對於識別各種加密流量應用中的攻擊的影響也有討論。本書提出了分析加密網路流量的智能技術,並包含案例研究。

第一章還提供了網路流量分析的基本原理、網路流量中的異常、加密網路流量的協議。第二章概述了加密網路流量的挑戰和問題,以及加密網路流量所引入的新威脅向量。第三章詳細分析了加密網路流量及各種加密網路流量的分類。第四章討論了檢測針對加密協議攻擊的技術,第五章分析了基於人工智慧的異常檢測方法。

從事加密網路流量相關領域的研究人員和專業人士將購買本書作為參考。主修計算機科學的高級學生也會發現本書是個有價值的資源。

作者簡介

Dr. Aswani Kumar Cherukuri is a Professor (Higher Academic Grade) of School of Computer Science Engineering & Information Systems, Vellore Institute of Technology, Vellore, India. His research interests are machine learning, information security and quantum computing. In particular, his work is focused on encrypted network traffic analysis, machine learning techniques. Also, he has interests in post quantum cryptography. He published more than 190 research papers and has 4100+ citations and h-index of 31 as per Google scholar. He executed as principal investigator, different research projects of worth 10 million USD from various funding agencies of India. He has guided 8 PhD research scholars and few foreign interns. He has received awards including Young Scientist Fellowship, Inspiring Teacher Award, Educator excellence award, etc. He is editorial board member of several international journals. He is a member of IEEE, Senior Member of ACM, Vice Chair of IEEE Educational Taskforce on Datamining.

Dr. Sumaiya Thaseen Ikram is an Associate Professor (Senior) in the School of Computer Science and Information Systems in Vellore Institute of Technology, Vellore with 18 years of teaching and research experience. She has expertise in Cryptography, Network Security, Software Security, Intrusion Detection Systems, Artificial Intelligence, Image Processing, Ethical hacking, Vulnerability Assessment and Penetration Testing. She has 1400+ citations and h-index of 15 in google scholar and most of her research works are published in high impact factor journals. She is a reviewer for many journals of Wiley, Elsevier, and Springer publishers. She is a certified ethical hacker, certified penetration testing engineer and certified computer hacking forensic investigator. She has successfully completed a research project as a Co-PI funded by MHRD worth Rs.63 lakhs between 2019-2023 in collaboration with Deakin University, Australia. She also completed a consultancy project worth Rs.6 lakhs in the domain of full stack development in the year 2022. She has delivered many expert talks in the domain of Intrusion detection Systems in Taylors University, Malaysia and Deakin University, Australia.

Dr. Gang Li is the university academic board member and full professor at Deakin University, and he is the AI director in the Strategic Research Center of Cyber Resilience and Trust (CREST). His research includes data mining, privacy preservation, group behavior analysis and business intelligence. He holds one international patent, and he has co-authored nine papers that won best paper prizes, including Springer's Journal of IT & Tourism best paper award in 2023, KSEM 2018 best paper award, IFITT Journal Paper of the Year 2018/2015, ACM/IEEE ASONAM2012 best paper award, the 2008 Nightingale Prize by Springer, etc.

Dr. Xiao Liu received his bachelor's and master's degrees in information management and information system from the School of Management, Hefei University of Technology, Hefei, China, in 2004 and 2007, respectively, and his Ph.D. degree in computer science and software engineering from the Faculty of Information and Communication Technologies, Swinburne University of Technology, Melbourne, Australia, in 2011. He was an Associate Professor at the Software Engineering Institute, East China Normal University, Shanghai, China, during 2013 to 2015. He is currently an Associate Professor and Director for the Software Engineering Innovation Lab with the School of Information Technology, Deakin University, Australia. His research interests include workflow systems, cloud and edge computing, big data analytics, social network, and human-centric software engineering. He is a Senior Member of ACM and IEEE.

作者簡介(中文翻譯)

Dr. Aswani Kumar Cherukuri 是印度維洛爾科技學院計算機科學工程與資訊系的高級教授。他的研究興趣包括機器學習、資訊安全和量子計算。特別是,他的工作專注於加密網路流量分析和機器學習技術。此外,他對後量子密碼學也有興趣。他已發表超過190篇研究論文,根據Google Scholar的資料,引用次數超過4100次,h-index為31。他擔任多個價值1000萬美元的研究項目的首席研究員,這些項目來自印度的各個資助機構。他指導了8位博士研究生和幾位外國實習生。他獲得的獎項包括青年科學家獎、啟發教師獎、教育卓越獎等。他是多本國際期刊的編輯委員會成員,也是IEEE的會員、ACM的高級會員,以及IEEE教育工作組數據挖掘的副主席。

Dr. Sumaiya Thaseen Ikram 是印度維洛爾科技學院計算機科學與資訊系的副教授(高級),擁有18年的教學和研究經驗。她在密碼學、網路安全、軟體安全、入侵檢測系統、人工智慧、影像處理、道德駭客、漏洞評估和滲透測試方面具有專業知識。根據Google Scholar的資料,她的引用次數超過1400次,h-index為15,且她的大部分研究成果發表在高影響因子的期刊上。她是Wiley、Elsevier和Springer出版的多本期刊的審稿人。她是認證的道德駭客、認證的滲透測試工程師和認證的計算機駭客取證調查員。她成功完成了一個由MHRD資助的研究項目,作為共同首席研究員,該項目在2019年至2023年間與澳大利亞迪肯大學合作,資金達630萬盧比。她還在2022年完成了一個價值60萬盧比的全棧開發顧問項目。她在馬來西亞泰萊大學和澳大利亞迪肯大學的入侵檢測系統領域發表了多場專家演講。

Dr. Gang Li 是迪肯大學的學術委員會成員及全職教授,並擔任網路韌性與信任戰略研究中心(CREST)的人工智慧主任。他的研究包括數據挖掘、隱私保護、群體行為分析和商業智慧。他擁有一項國際專利,並共同撰寫了九篇獲得最佳論文獎的論文,包括2023年Springer的IT與旅遊最佳論文獎、2018年KSEM最佳論文獎、2018/2015年IFITT年度最佳論文獎、ACM/IEEE ASONAM2012最佳論文獎,以及2008年Springer的奈廷格獎等。

Dr. Xiao Liu 於2004年和2007年分別在中國合肥工業大學管理學院獲得資訊管理和資訊系統的學士及碩士學位,並於2011年在澳大利亞斯威本科技大學資訊與通信技術學院獲得計算機科學與軟體工程的博士學位。他曾於2013年至2015年擔任中國東華師範大學軟體工程研究所的副教授。目前,他是澳大利亞迪肯大學資訊科技學院的副教授及軟體工程創新實驗室主任。他的研究興趣包括工作流程系統、雲端與邊緣計算、大數據分析、社交網路和以人為中心的軟體工程。他是ACM和IEEE的高級會員。