Navigation überspringen
Universitätsbibliothek Heidelberg
Standort: ---
Exemplare: ---
 Online-Ressource
Verfasst von:Fung, Carol [VerfasserIn]   i
 Boutaba, Raouf [VerfasserIn]   i
Titel:Intrusion Detection Networks
Institutionen:Safari, an O’Reilly Media Company.   i
Verf.angabe:Fung, Carol
Ausgabe:1st edition
Verlagsort:[Erscheinungsort nicht ermittelbar]
Verlag:Auerbach Publications
Jahr:2013
Umfang:1 online resource (261 pages)
Fussnoten:Online resource; Title from title page (viewed November 19, 2013)
Abstract:The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
ComputerInfo:Mode of access: World Wide Web.
URL:Aggregator: https://learning.oreilly.com/library/view/-/9781466564121/?ar
Datenträger:Online-Ressource
Sprache:eng
Sach-SW:Information technology ; Security measures
 Computer security ; Management
 Computer networks ; Security measures
 Data protection
 Electronic books ; local
K10plus-PPN:1694864324
 
 
Lokale URL UB: Zum Volltext
 
 Bibliothek der Medizinischen Fakultät Mannheim der Universität Heidelberg
 Klinikum MA Bestellen/Vormerken für Benutzer des Klinikums Mannheim
Eigene Kennung erforderlich
Bibliothek/Idn:UW / m3624823868
Lokale URL Inst.: Zum Volltext

Permanenter Link auf diesen Titel (bookmarkfähig):  https://katalog.ub.uni-heidelberg.de/titel/68566792   QR-Code
zum Seitenanfang