CDN$ 219.26
In Stock.
Ships from and sold by Gift-wrap available.
Computer Intrusion Detect... has been added to your Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint Paperback – Sep 21 2011

See all 3 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
CDN$ 219.26
CDN$ 197.45 CDN$ 198.61

Harry Potter and the Cursed Child
click to open popover

Special Offers and Product Promotions

  • You'll save an extra 5% on Books purchased from, now through July 29th. No code necessary, discount applied at checkout. Here's how (restrictions apply)

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Paperback: 333 pages
  • Publisher: Springer; Softcover reprint of the original 1st ed. 2001 edition (Sept. 21 2011)
  • Language: English
  • ISBN-10: 1441929371
  • ISBN-13: 978-1441929372
  • Product Dimensions: 15.5 x 2 x 23.5 cm
  • Shipping Weight: 522 g
  • Average Customer Review: Be the first to review this item
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description


From the reviews:


"After reading this book…I believe that many readers would benefit from the skillful joint development of problem context and statistical application. As a bridge between the computer science and mathematical communities, this book is a fine addition to both the computer science and statistics literature and will likely stimulate valuable research by awakening mathematicians and statisticians to the potential of the problems in this area…This book would be appropriate for an upper-level undergraduate or graduate course in computer science and statistics. It would also be a useful introductory reference for the mathematics and statistics researcher who would like to pursue problems in this area. It is both informative and accessible."


"The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistcian who wishes to make an impact in an area, which will continue to be of great importance."
ISI Short Book Reviews, April 2002

"This book is a very good text on intrusion detection, written by an author who has direct practical experience … . Each chapter has a rich and detailed annotated bibliography, which makes this text a true gold-mine for researchers and practitioners. … the book is a good example of cross-fertilization between the networking and statistical fields, and will be appreciated both by the specialist and the general reader. It is an example … of interdisciplinarity, which is necessary in fields so complex as computer security." (Antonio Lioy, The Computer Journal, Vol. 45 (6), 2002)

"This book is about one of those areas that provides rich opportunities for statisticians … . The tools for computer intrusion detection are essentially statistical … . The book effectively provides the necessary background material for this intensely jargon-strewn area. The book includes many real examples … . The book provides an excellent introduction to the area. I recommend it to any computer- (and Unix-) literate statistician who wishes to make an impact in an area, which will continue to be of great importance." (D. J. Hand, Short Book Reviews, Vol. 22 (1), 2002)

About the Author

DAVID J. MARCHETTE, PhD, is a researcher at the Naval Surface Warfare Center in Dahlgren, Virginia, where he investigates computational statistics and pattern recognition, primarily as it applies to image processing, automatic target recognition, and computer security. He is also an adjunct professor at George Mason University and a lecturer at Johns Hopkins University.

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) HASH(0x9d9aecd8) out of 5 stars 1 review
2 of 2 people found the following review helpful
HASH(0x9d9cd144) out of 5 stars Concise, readable, and useful Jan. 16 2009
By S. Plowright - Published on
Format: Hardcover Verified Purchase
For anyone interested in network traffic analysis, particularly IDS/IPS, this is a unique and valuable book. It does assume a basic knowledge of networking (maybe CCNA level), and mathematical statistics to about 2nd year university.

The book focuses on practical approaches to computing useful estimators, including performance optimisation for real-time analysis. It also has examples of data visualisation methods.

Despite its compact size, the scope of the book is quite broad, ranging from traffic modeling, to user profiling, to viral epidemiology. It describes various attack types. It also covers some useful tools for data acquisition, integrity checking, etc.

I did have to go back to my old textbooks to fill in the gaps in my grasp of probability density functions, but the concepts are discussed clearly.

The only slight criticism, is that commercial IDS/IPS systems have come so far since the book was written, and the scale of the problem has also expanded exponentially. I would like to see a revised edition some time. However, the theory and most of the practicalities discussed still hold, and the book should still be useful for some time to come.