Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Intrusion Detection Networks - A Key to Collaborative Security (Paperback)
Loot Price: R1,302
Discovery Miles 13 020
|
|
Intrusion Detection Networks - A Key to Collaborative Security (Paperback)
Expected to ship within 12 - 17 working days
|
The rapidly increasing sophistication of cyber intrusions makes
them nearly impossible to detect without the use of a collaborative
intrusion detection network (IDN). Using overlay networks that
allow an intrusion detection system (IDS) to exchange information,
IDNs can dramatically improve your overall intrusion detection
accuracy. Intrusion Detection Networks: A Key to Collaborative
Security focuses on the design of IDNs and explains how to leverage
effective and efficient collaboration between participant IDSs.
Providing a complete introduction to IDSs and IDNs, it explains the
benefits of building IDNs, identifies the challenges underlying
their design, and outlines possible solutions to these problems. It
also reviews the full-range of proposed IDN solutions-analyzing
their scope, topology, strengths, weaknesses, and limitations.
Includes a case study that examines the applicability of
collaborative intrusion detection to real-world malware detection
scenarios Illustrates distributed IDN architecture design Considers
trust management, intrusion detection decision making, resource
management, and collaborator management The book provides a
complete overview of network intrusions, including their potential
damage and corresponding detection methods. Covering the range of
existing IDN designs, it elaborates on privacy, malicious insiders,
scalability, free-riders, collaboration incentives, and intrusion
detection efficiency. It also provides a collection of problem
solutions to key IDN design challenges and shows how you can use
various theoretical tools in this context. The text outlines
comprehensive validation methodologies and metrics to help you
improve efficiency of detection, robustness against malicious
insiders, incentive-compatibility for all participants, and
scalability in network size. It concludes by highlighting open
issues and future challenges.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.