Intrusion Detection in Distributed Systems
An Abstraction-Based Approach
(Sprache: Englisch)
Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms as a second line of defense that protects information systems. Even if preventive security mechanisms can protect information systems successfully, it is...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
Fr. 59.00
inkl. MwSt.
- Kreditkarte, Paypal, Rechnungskauf
- 30 Tage Widerrufsrecht
Produktdetails
Produktinformationen zu „Intrusion Detection in Distributed Systems “
Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms as a second line of defense that protects information systems. Even if preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. This book unites three research contributions detailing new approaches that are superior to existing centralized or hierarchical approaches.
Klappentext zu „Intrusion Detection in Distributed Systems “
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Inhaltsverzeichnis zu „Intrusion Detection in Distributed Systems “
Dedication.- List of Figures.- List of Tables.- Preface.- Acknowledgments.- 1. INTRODUCTION.- 1 Computer Security and Intrusion Detection.- 2 Intrusion Detection in Distributed Systems.- 3 Summary of Contributions.- 4 Organization.- 2. AN OVERVIEW OF RELATED RESEARCH.- 3. SYSTEM VIEW AND EVENT HISTORY.- 1 System View and Event History.- 4. MODELING REQUEST AMONG COOPERATING INTRUSION DETECTION SYSTEMS.- 1 Query.- 2 Scaling to Large and Heterogeneous Environments.- 3 Discussion.- 5. EXTENDING COMMON INTRUSION DETECTION FRAMEWORK (CIDF) TO SUPPORT QUERIES.- 1 Background.- 2 A Query Facility for CIDF.- 3 Impact on CIDF.- 6. A HIERARCHICAL MODEL FOR DISTRIBUTED ATTACKS.- 1 Misuse Signature.- 2 Defining System Views Using Signatures: A Hierarchical Model.- 3 Discussion.- 7. DECENTRALIZED DETECTION OF DISTRIBUTED ATTACKS.- 1 Serializable Signatures.- 2 Detection Task and Workflow Tree.- 3 Execution of Detection Tasks.- 4 Optimization.- 5 Generating Workflow Tree.- 8. CARDS: AN EXPERIMENTAL SYSTEM FOR DETECTING DISTRIBUTED ATTACKS.- 1 CARDS Architecture.- 2 System Design Issues.- 3 Prototype Implementation.- 9. CONCLUSION.- Appendices.- References.
Autoren-Porträt von Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA
Bibliographische Angaben
- Autoren: Peng Ning , Sushil Jajodia , Xiaoyang Sean Wang
- 2013, 2004, XIX, 136 Seiten, Masse: 15,5 x 23,5 cm, Kartoniert (TB), Englisch
- Verlag: Springer, Berlin
- ISBN-10: 1461350913
- ISBN-13: 9781461350910
Sprache:
Englisch
Kommentar zu "Intrusion Detection in Distributed Systems"
0 Gebrauchte Artikel zu „Intrusion Detection in Distributed Systems“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Intrusion Detection in Distributed Systems".
Kommentar verfassen