Cantitate/Preț
Produs

Intrusion Detection in Distributed Systems: An Abstraction-Based Approach: Advances in Information Security, cartea 9

Autor Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
en Limba Engleză Paperback – 26 apr 2013
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 32563 lei  6-8 săpt.
  Springer Us – 26 apr 2013 32563 lei  6-8 săpt.
Hardback (1) 33191 lei  6-8 săpt.
  Springer Us – 31 oct 2003 33191 lei  6-8 săpt.

Din seria Advances in Information Security

Preț: 32563 lei

Preț vechi: 40703 lei
-20% Nou

Puncte Express: 488

Preț estimativ în valută:
6232 6429$ 5274£

Carte tipărită la comandă

Livrare economică 04-18 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781461350910
ISBN-10: 1461350913
Pagini: 160
Ilustrații: XIX, 136 p.
Dimensiuni: 155 x 235 x 8 mm
Greutate: 0.23 kg
Ediția:2004
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security

Locul publicării:New York, NY, United States

Public țintă

Research

Cuprins

Dedication.- List of Figures.- List of Tables.- Preface.- Acknowledgments.- 1. INTRODUCTION.- 1 Computer Security and Intrusion Detection.- 2 Intrusion Detection in Distributed Systems.- 3 Summary of Contributions.- 4 Organization.- 2. AN OVERVIEW OF RELATED RESEARCH.- 3. SYSTEM VIEW AND EVENT HISTORY.- 1 System View and Event History.- 4. MODELING REQUEST AMONG COOPERATING INTRUSION DETECTION SYSTEMS.- 1 Query.- 2 Scaling to Large and Heterogeneous Environments.- 3 Discussion.- 5. EXTENDING COMMON INTRUSION DETECTION FRAMEWORK (CIDF) TO SUPPORT QUERIES.- 1 Background.- 2 A Query Facility for CIDF.- 3 Impact on CIDF.- 6. A HIERARCHICAL MODEL FOR DISTRIBUTED ATTACKS.- 1 Misuse Signature.- 2 Defining System Views Using Signatures: A Hierarchical Model.- 3 Discussion.- 7. DECENTRALIZED DETECTION OF DISTRIBUTED ATTACKS.- 1 Serializable Signatures.- 2 Detection Task and Workflow Tree.- 3 Execution of Detection Tasks.- 4 Optimization.- 5 Generating Workflow Tree.- 8. CARDS: AN EXPERIMENTAL SYSTEM FOR DETECTING DISTRIBUTED ATTACKS.- 1 CARDS Architecture.- 2 System Design Issues.- 3 Prototype Implementation.- 9. CONCLUSION.- Appendices.- References.

Notă biografică

Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA

Caracteristici

Includes machine learning and data mining technologies Unique new approach is superior to existing centralized or hierarchical approaches