LEADER 02888nam 2200505 450 001 9910427715503321 005 20210211110054.0 010 $a981-15-6575-9 024 7 $a10.1007/978-981-15-6575-5 035 $a(CKB)4100000011457715 035 $a(DE-He213)978-981-15-6575-5 035 $a(MiAaPQ)EBC6350773 035 $a(PPN)250219549 035 $a(EXLCZ)994100000011457715 100 $a20210211d2020 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAccountability and privacy in network security /$fYuxiang Ma, Yulei Wu, Jingguo Ge 205 $a1st ed. 2020. 210 1$aCham, Switzerland :$cSpringer,$d[2020] 210 4$dİ2020 215 $a1 online resource (XII, 140 p. 62 illus., 59 illus. in color.) 311 $a981-15-6574-0 327 $aIntroduction -- A Comprehensive Survey -- Encrypted Tra?c Classi?cation -- A Content-based Architecture -- A Flow-based Architecture -- A Service-based Architecture -- An Information-Centric Networking based Architecture -- Summary. 330 $aThis book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets. Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity. 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aComputer security 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aComputer security. 676 $a005.8 700 $aMa$b Yuxiang$0971608 702 $aWu$b Yulei 702 $aGe$b Jingguo 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910427715503321 996 $aAccountability and privacy in network security$92208963 997 $aUNINA