Intrusion detection networks a key to collaborative security
The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your ove...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press, Taylor & Francis Group
[2014]
|
Edición: | 1st edition |
Colección: | Gale eBooks
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628106506719 |
Tabla de Contenidos:
- Front Cover; Contents; List of Figures; List of Tables; Preface; About the Authors; SECTION I: INTRODUCTION; SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION; 2. Cyber Intrusions; 3. Intrusion Detection; SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK; 4. Collaborative Intrusion Detection Networks Architecture Design; 5. Trust Management; 6. Collaborative Decision; 7. Resource Management; 8. Collaborators Selection and Management; SECTION IV: OTHER TYPES OF IDN DESIGN; 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation
- 10. Collaborative Malware Detection NetworksSECTION V: CONCLUSION; SECTION VI: APPENDICES; A. Examples of Intrusion Detection Rules and Alerts; B. Proofs of Theorems; References