Picture 1 of 1
Smart Log Data Analytics: Techniques for Advanced Security Analysis by Florian S
Condition:
3 available
Shipping:
International shipment of items may be subject to customs processing and additional charges.
Located in: Calgary, Alberta, Canada
Delivery:
Estimated between Wed, May 22 and Fri, May 31 to 43230
Please allow additional time if international delivery is subject to customs processing.
Returns:
Payments:
Shop with confidence
Seller information
- 98.2% positive feedback
Registered as a Business Seller
Seller assumes all responsibility for this listing.
eBay item number:364819630098
Item specifics
- Condition
- ISBN-13
- 9783030744496
- Book Title
- Smart Log Data Analytics
- ISBN
- 9783030744496
- Publication Year
- 2021
- Type
- Textbook
- Format
- Hardcover
- Language
- English
- Publication Name
- Smart Log Data Analytics : Techniques for Advanced Security Analysis
- Item Length
- 9.3in
- Publisher
- Springer International Publishing A&G
- Item Width
- 6.1in
- Item Weight
- 17.8 Oz
- Number of Pages
- Xv, 208 Pages
About this product
Product Information
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicitiesthrough log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
Product Identifiers
Publisher
Springer International Publishing A&G
ISBN-10
3030744493
ISBN-13
9783030744496
eBay Product ID (ePID)
24050409764
Product Key Features
Publication Name
Smart Log Data Analytics : Techniques for Advanced Security Analysis
Format
Hardcover
Language
English
Publication Year
2021
Type
Textbook
Number of Pages
Xv, 208 Pages
Dimensions
Item Length
9.3in
Item Width
6.1in
Item Weight
17.8 Oz
Additional Product Features
Number of Volumes
1 Vol.
Lc Classification Number
Qa76.9.A25
Table of Content
I1.- Introduction.- 1.1 State of the art in security monitoring and anomaly detection.- 1.2 Current trends.- 1.3. future challenges.- 1.4 Log data analysis: today and tomorrow.- 1.5 Smart log data analytics: Structure of the book.- 1.6 Try it out: Hands-on examples throughout the book.- 2 Survey on log clustering approaches.- 2.1 Introduction. 2.2 Survey background.- 2.1 The nature of log data. 2.2 Static clustering.- 2.3 Dynamic clustering.- 2.4 Applications in the security domain.- 2.3 Survey method.- 2.3.1 Set of criteria.- 2.3.2 Literature search.- 2.4 Survey results.- 2.4.1 Purpose and applicability (P).- 2.4.2 Clustering techniques (C).- 2.4.3 Anomaly detection (AD).- 2.4.4 Evaluation (E). 2.4.5 Discussion.- 2.5 Conclusion.- 3 Incremental log data clustering for processing large amounts of data online.- 3.1 Introduction.- 3.2 Concept for incremental clustering.- 3.2.1 Incremental clustering.- 3.2.2 Description of model.- 3.2.3 String metrics.- 3.2.4 Description of model M1. 3.2.5 Time series analysis.- 3.3 Outlook and further development.- 3.4 Try it out.- 3.4.1 Exim Mainlog.- 3.4.2 Messages log file.- 4 Generating character-based templates for log data.- 4.1 Introduction.- 4.2 Concept for generating character-based templates.- 4.3 Cluster template generator algorithms4.3.1 Initial matching.- 4.3.2 Merge algorithm.-4.3.3 Length algorithm.- 4.3.4 Equalmerge algorithm.- 4.3.5 Token_char algorithm.- 4.3.6 Comparison.- 4.4 Outlook and further development.- 4.5 Try it out .- 4.5.1 Exim Mainlog.- 5 Time series analysis for temporal anomaly detection5.1 Introduction.- 5.2 Concept for dynamic clustering and AD.- 5.3 Cluster evolution.- 5.3.1 Clustering model.- 5.3.2 Tracking.- 5.3.3 Transitions.- 5.3.4 Evolution metrics .- 5.4 Time series analysis.- 5.4.1 Model.- 5.4.2 Forecast.- 5.4.3 Correlation.- 5.4.4 Detection.- 5.5 Example.- 5.5.1 Long-term analysis of Suricata logs.- 5.5.2 Short-term analysis of Audit logs.- 6 AECID: A light-weight log analysis approach for online anomaly detection.- 6.1 Introduction.- 6.2 The AECID approach.- 6.2.1 AMiner.- 6.2. AECID central.- 6.2. Detecting anomalies.- 6.2. Rule generator.- 6.2. Correlation engine.- 6.2. Detectable anomalies.- 6. System deployment and operation.- 6. Application scenarios.- 6. Try it out.- 6.5.1 Configuration of the AMiner for AIT-LDSv1. - 6.5.2 Apache Access logs.- 6.5.3 Exim Mainlog file.- 6.5.4 Audit logs.- 7. A concept for a tree-based log parser generator.- 7.1 Introduction.- 7.2 Tree-based parser concept.- 7.3 AECID-PG: tree-based log parser generator.- 7.3.1 Challenges when generating tree-like parsers.- 7.3.2 AECID-PG concept.- 7.3.3 AECID-PG rules.- 7.3.4 Features.- 7.4 Outlook and further application.- 7.5 Try it out.- 7.5.1 Exim Mainlog.- 7.5.2 Audit logs.- 8 Variable type detector for statistical analysis of log tokens.- 8.1 Introduction.-.-8.2 Variable type detector concept.- 8.3 Variable type detector algorithm.- 8.3.1 Sanitize log data.- 8.3.2 Initialize types.- 8.3.3 Update types.- 8.3.4 Compute indicators.- 8.3.5 Select tokens.- 8.3.6 Compute indicator weights.- 8.3.7 Report anomalies.- 8.4 Try it out.- 8.4.1 Apache Access log.- 9. Final remarks.
Copyright Date
2021
Topic
Probability & Statistics / General, Security / General, Intelligence (Ai) & Semantics
Dewey Decimal
005.8
Dewey Edition
23
Illustrated
Yes
Genre
Computers, Mathematics
Item description from the seller
Seller assumes all responsibility for this listing.
eBay item number:364819630098
Shipping and handling
Item location:
Calgary, Alberta, Canada
Ships to:
Worldwide
Excludes:
APO/FPO, Alaska/Hawaii, Belarus, Kuwait, Macedonia, Morocco, Qatar, Russian Federation, Saudi Arabia, US Protectorates, Ukraine
Shipping and handling | Each additional item | To | Service | Delivery*See Delivery notes |
---|---|---|---|---|
Free shipping | Free | United States | Economy Shipping | Estimated between Wed, May 22 and Fri, May 31 to 43230 |
Handling time |
---|
Will usually ship within 10 business days of receiving cleared payment. |
Taxes |
---|
Taxes may be applicable at checkout. Learn moreLearn more about paying tax on eBay purchases |
Sales tax for an item #364819630098
Sales tax for an item #364819630098
Seller collects sales tax for items shipped to the following provinces:
Province | Sales Tax Rate |
---|
Return policy
After receiving the item, contact seller within | Refund will be given as |
---|---|
30 days after the buyer receives it | Money Back |
The buyer is responsible for return shipping costs.
Payment details
Payment methods
Seller feedback (1,021,859)
i***6 (139)- Feedback left by buyer.
Past 6 months
Verified purchase
Item as described, good price, well packaged, arrived slightly later than hoped (not in time for Christmas ) but the order was placed in a very busy shipping period. No issue with the seller’s speed of response and sending the item. Great seller!
t***r (91)- Feedback left by buyer.
Past 6 months
Verified purchase
I was pleasantly surprised by how soon I received this textbook given that it shipped from outside the U.S. It was packaged well with no damage. The price was right. And I greatly appreciated the communication informing me where the book was shipping from and including a tracking number. Overall, a positive experience, - online shopping the way it should be. I've bought books from this seller several times now without any complaints and will surely buy from them again. Thanks a lot!
s***3 (147)- Feedback left by buyer.
Past month
Verified purchase
Quality and hard to find book that won't be released 'til January 2025 in the U.S.A.
Fantastic price.
Book was in a secure and protective package. Arrived a few days after I placed order and that was faster than I expected.
Seller is a fantastic communicator and proactive in regards to tracking status. I'd definitely buy from them in the future.
Product ratings and reviews
More to explore:
- Photography Techniques Hardcover Nonfiction Books,
- Management Techniques Hardcover Nonfiction Books,
- Nonfiction Books Fiction & Management Techniques,
- Nonfiction Books Fiction & Photography Techniques,
- Nonfiction Books in English Fiction & Management Techniques,
- Nonfiction Books in English and Photography Techniques Fiction Illustrated,
- Photography Techniques Hardcover Nonfiction Books Illustrated,
- Nonfiction Books Fiction & Security,
- Computer & IT Nonfiction Books Fiction & Security,
- Nonfiction Security Paperbacks Books in English