LEADER 05597nam 2200481 450 001 996549370303316 005 20220831164151.0 010 $a981-16-8324-7 010 $a981-16-8325-5 010 $a981-16-8325-5 035 $a(MiAaPQ)EBC6827684 035 $a(Au-PeEL)EBL6827684 035 $a(CKB)20151634200041 035 $a(OCoLC)1289368542 035 $a(PPN)259391123 035 $a(EXLCZ)9920151634200041 100 $a20220831d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork behavior analysis $emeasurement, models, and applications /$fKuai Xu 210 1$aSingapore :$cSpringer,$d[2021] 210 4$dİ2021 215 $a1 online resource (170 pages) 311 08$aPrint version: Xu, Kuai Network Behavior Analysis Singapore : Springer Singapore Pte. Limited,c2022 9789811683244 327 $aIntro -- Preface -- Acknowledgements -- Contents -- 1 Introduction -- 1.1 What is Network Behavior Analysis -- 1.2 Network Behavior Measurement and Modeling -- 1.3 Benefits of Network Behavior Analysis -- 1.4 Book Overview and Organization -- References -- 2 Background of Network Behavior Analysis -- 2.1 Internet Measurement and Analysis -- 2.2 Data Collection for Network Behavior Analysis -- 2.3 Preliminaries of Network Behavior Analysis -- 2.3.1 Information Theory and Entropy -- 2.3.2 Graphical Analysis -- References -- 3 Behavior Modeling of Network Traffic -- 3.1 Behavior-Oriented Network Traffic Modeling -- 3.1.1 What is Network Behavior -- 3.1.2 Traffic Features in Network Behavior -- 3.1.3 Behavioral Entities -- 3.1.4 Real-World Network Traffic Datasets -- 3.2 Identifying Significant Behavioral Entities -- 3.2.1 Significant Behavioral Entities -- 3.2.2 Adaptive Thresholding Algorithm -- 3.2.3 Extracting Significant Traffic Clusters -- 3.3 Network Behavior Modeling -- 3.3.1 Network Behavior Modeling -- 3.3.2 Network Behavior Classifications -- 3.4 Network Behavior Dynamics -- 3.4.1 Temporal Properties of Behavior Classes -- 3.4.2 Behavior Dynamics of Individual Clusters -- 3.5 Summary -- References -- 4 Structural Modeling of Network Traffic -- 4.1 Communication Structure Analysis -- 4.1.1 Dominant State Analysis -- 4.1.2 Communication Structure of Networked Systems and Internet Applications -- 4.2 Exploring More Traffic Features -- 4.3 Summary -- References -- 5 Graphical Modeling of Network Traffic -- 5.1 Cluster-Aware Network Behavior Analysis -- 5.2 Modeling Host Communications with Bipartite Graphs and One-Mode Projections -- 5.3 Similarity Matrices and Clustering Coefficient of One-Mode Projection Graphs -- 5.3.1 Similarity Matrices -- 5.3.2 Clustering Coefficients -- 5.4 Discovering Behavior Clusters via Clustering Algorithms. 327 $a5.4.1 Partitioning Similarity Matrix with Spectral Clustering Algorithm -- 5.4.2 Clustering Analysis of Internet Applications -- 5.5 Traffic Characteristics and Similarity of Behavior Clusters -- 5.5.1 Making Sense of End-Host Behavior Clusters -- 5.5.2 Distinct Traffic Characteristics of Behavior Clusters -- 5.5.3 Exploring Similarity of Internet Applications -- 5.6 Summary -- References -- 6 Real-Time Network Behavior Analysis -- 6.1 Real-Time Network Measurement and Monitoring -- 6.2 Real-Time System for Network Behavior Analysis -- 6.2.1 Design Guidelines -- 6.2.2 System Architecture -- 6.2.3 Key Implementation Details -- 6.3 Performance Evaluation -- 6.3.1 Benchmarking -- 6.3.2 Stress Test -- 6.4 Sampling and Filtering -- 6.4.1 Random Sampling -- 6.4.2 Profiling-Aware Filtering -- 6.5 Summary -- References -- 7 Applications -- 7.1 Profiling Internet Traffic -- 7.1.1 Server/Service Behavior Profiles -- 7.1.2 Heavy-Hitter Host Behavior Profiles -- 7.1.3 Scan/Exploit Profiles -- 7.1.4 Deviant or Rare Behaviors -- 7.2 Reducing Unwanted Traffic on the Internet -- 7.2.1 Unwanted Exploit Traffic on the Internet -- 7.2.2 Characteristics of Unwanted Exploit Traffic -- 7.2.3 Strategies of Reducing Unwanted Traffic -- 7.2.4 Sequential Behavior Analysis -- 7.3 Cluster-Aware Applications of Network Behavior Analysis -- 7.3.1 End-Host Network Behavior Clusters -- 7.3.2 Network Application Behavior Clusters -- 7.4 Summary -- References -- 8 Research Frontiers of Network Behavior Analysis -- 8.1 Network Behavior Analysis in the Cloud -- 8.1.1 Background -- 8.1.2 Profiling-as-a-Service in the Cloud -- 8.1.3 Architecture of Profiling-as-a-Service for Network Behavior Analysis -- 8.1.4 Designing the Profiling-as-a-Service Infrastructure -- 8.2 Network Behavior Analysis in Smart Homes -- 8.2.1 Background -- 8.2.2 Traffic Monitoring Platform for Home Networks. 327 $a8.2.3 Characterizing Home Network Traffic -- 8.2.4 Unwanted Traffic Towards Home Networks -- 8.3 Network Behavior Analysis for Internet of Things -- 8.3.1 Background -- 8.3.2 IoT Traffic Measurement and Monitoring -- 8.3.3 An IoT Traffic Measurement Framework via Programmable Edge Routers -- 8.3.4 Multidimensional Behavioral Profiling of IoT Devices -- 8.3.5 Exploring the Applications of Multidimensional Behavioral Profiling -- 8.4 Summary -- References. 606 $aInternet$xManagement 606 $aComputer networks$xManagement 615 0$aInternet$xManagement. 615 0$aComputer networks$xManagement. 676 $a004.678 700 $aXu$b Kuai$01080936 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996549370303316 996 $aNetwork behavior analysis$93558726 997 $aUNISA LEADER 00987nam0 22002651i 450 001 UON00151494 005 20231205102924.408 100 $a20020107d1990 |0itac50 ba 101 $achi 102 $aCN 105 $a||||e ||||| 200 1 $aShiyong wenyan wencidian$fZhihong Li 210 $aLanzhou$cGansu Renmin Chubanshe$d1990 215 $a911 p.$d23 cm 606 $aLingua cinese$xCinese classico$xDizionari$3UONC018101$2FI 620 $dLanzhou$3UONL001029 686 $aCIN II A$cCINA - LINGUISTICA - DIZIONARI$2A 700 0$aLI Zhihong$3UONV090356$0673055 712 $aGansu Renmin Chubanshe$3UONV249543$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00151494 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI CIN II A 179 N $eSI SA 101298 7 179 N 996 $aShiyong wenyan wencidian$91274348 997 $aUNIOR