Intrusion detection networks a key to collaborative security

The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your ove...

Descripción completa

Detalles Bibliográficos
Otros Autores: Fung, Carol, author (author), Boutaba, Raouf, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton : CRC Press, Taylor & Francis Group [2014]
Edición:1st edition
Colección:Gale eBooks
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628106506719
Tabla de Contenidos:
  • Front Cover; Contents; List of Figures; List of Tables; Preface; About the Authors; SECTION I: INTRODUCTION; SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION; 2. Cyber Intrusions; 3. Intrusion Detection; SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK; 4. Collaborative Intrusion Detection Networks Architecture Design; 5. Trust Management; 6. Collaborative Decision; 7. Resource Management; 8. Collaborators Selection and Management; SECTION IV: OTHER TYPES OF IDN DESIGN; 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation
  • 10. Collaborative Malware Detection NetworksSECTION V: CONCLUSION; SECTION VI: APPENDICES; A. Examples of Intrusion Detection Rules and Alerts; B. Proofs of Theorems; References