Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Intrusion detection networks : a key to collaborative security / Carol Fung and Raouf Boutaba.

By: Contributor(s): Material type: TextTextPublisher: Boca Raton : CRC Press, [2014]Description: xxii, 239 pages ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781466564121 (hardcover : alk. paper)
  • 1466564121 (hardcover : alk. paper)
Subject(s): DDC classification:
  • 005.8 23 F.C.I
LOC classification:
  • QA76.9.A25 F85 2014
Online resources:
Contents:
Front Cover Contents (1/2) Contents (2/2) List of Figures List of Tables Preface About the Authors SECTION I: INTRODUCTION (1/2) SECTION I: INTRODUCTION (2/2) SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION 2. Cyber Intrusions (1/3) 2. Cyber Intrusions (2/3) 2. Cyber Intrusions (3/3) 3. Intrusion Detection (1/4) 3. Intrusion Detection (2/4) 3. Intrusion Detection (3/4) 3. Intrusion Detection (4/4) SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK 4. Collaborative Intrusion Detection Networks Architecture Design (1/2) 4. Collaborative Intrusion Detection Networks Architecture Design (2/2) 5. Trust Management (1/5) 5. Trust Management (2/5) 5. Trust Management (3/5) 5. Trust Management (4/5) 5. Trust Management (5/5) 6. Collaborative Decision (1/5) 6. Collaborative Decision (2/5) 6. Collaborative Decision (3/5) 6. Collaborative Decision (4/5) 6. Collaborative Decision (5/5) 7. Resource Management (1/5) 7. Resource Management (2/5) 7. Resource Management (3/5) 7. Resource Management (4/5) 7. Resource Management (5/5) 8. Collaborators Selection and Management (1/6) 8. Collaborators Selection and Management (2/6) 8. Collaborators Selection and Management (3/6) 8. Collaborators Selection and Management (4/6) 8. Collaborators Selection and Management (5/6) 8. Collaborators Selection and Management (6/6) SECTION IV: OTHER TYPES OF IDN DESIGN 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (1/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (2/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (3/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (4/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (5/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (6/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (7/7) 10. Collaborative Malware Detection Networks (1/6) 10. Collaborative Malware Detection Networks (2/6) 10. Collaborative Malware Detection Networks (3/6) 10. Collaborative Malware Detection Networks (4/6) 10. Collaborative Malware Detection Networks (5/6) 10. Collaborative Malware Detection Networks (6/6) SECTION V: CONCLUSION SECTION VI: APPENDICES A. Examples of Intrusion Detection Rules and Alerts B. Proofs of Theorems
Star ratings
    Average rating: 0.0 (0 votes)

computer bookfair2015

Includes bibliographical references and index.

Front Cover
Contents (1/2)
Contents (2/2)
List of Figures
List of Tables
Preface
About the Authors
SECTION I: INTRODUCTION (1/2)
SECTION I: INTRODUCTION (2/2)
SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION
2. Cyber Intrusions (1/3)
2. Cyber Intrusions (2/3)
2. Cyber Intrusions (3/3)
3. Intrusion Detection (1/4)
3. Intrusion Detection (2/4)
3. Intrusion Detection (3/4)
3. Intrusion Detection (4/4)
SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK
4. Collaborative Intrusion Detection Networks Architecture Design (1/2)
4. Collaborative Intrusion Detection Networks Architecture Design (2/2)
5. Trust Management (1/5)
5. Trust Management (2/5)
5. Trust Management (3/5)
5. Trust Management (4/5)
5. Trust Management (5/5)
6. Collaborative Decision (1/5)
6. Collaborative Decision (2/5)
6. Collaborative Decision (3/5)
6. Collaborative Decision (4/5)
6. Collaborative Decision (5/5)
7. Resource Management (1/5)
7. Resource Management (2/5)
7. Resource Management (3/5)
7. Resource Management (4/5)
7. Resource Management (5/5)
8. Collaborators Selection and Management (1/6)
8. Collaborators Selection and Management (2/6)
8. Collaborators Selection and Management (3/6)
8. Collaborators Selection and Management (4/6)
8. Collaborators Selection and Management (5/6)
8. Collaborators Selection and Management (6/6)
SECTION IV: OTHER TYPES OF IDN DESIGN
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (1/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (2/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (3/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (4/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (5/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (6/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (7/7)
10. Collaborative Malware Detection Networks (1/6)
10. Collaborative Malware Detection Networks (2/6)
10. Collaborative Malware Detection Networks (3/6)
10. Collaborative Malware Detection Networks (4/6)
10. Collaborative Malware Detection Networks (5/6)
10. Collaborative Malware Detection Networks (6/6)
SECTION V: CONCLUSION
SECTION VI: APPENDICES
A. Examples of Intrusion Detection Rules and Alerts
B. Proofs of Theorems

There are no comments on this title.

to post a comment.