Intrusion detection networks : a key to collaborative security / Carol Fung and Raouf Boutaba.
Material type:
TextPublisher: Boca Raton : CRC Press, [2014]Description: xxii, 239 pages ; 24 cmContent type: - text
- unmediated
- volume
- 9781466564121 (hardcover : alk. paper)
- 1466564121 (hardcover : alk. paper)
- 005.8 23 F.C.I
- QA76.9.A25 F85 2014
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library A2 | CSCS | CSIS | 005.8 F.C.I (Browse shelf(Opens below)) | Available | 00011640 |
Browsing Main library shelves, Shelving location: A2 Close shelf browser (Hides shelf browser)
computer bookfair2015
Includes bibliographical references and index.
Front Cover
Contents (1/2)
Contents (2/2)
List of Figures
List of Tables
Preface
About the Authors
SECTION I: INTRODUCTION (1/2)
SECTION I: INTRODUCTION (2/2)
SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION
2. Cyber Intrusions (1/3)
2. Cyber Intrusions (2/3)
2. Cyber Intrusions (3/3)
3. Intrusion Detection (1/4)
3. Intrusion Detection (2/4)
3. Intrusion Detection (3/4)
3. Intrusion Detection (4/4)
SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK
4. Collaborative Intrusion Detection Networks Architecture Design (1/2)
4. Collaborative Intrusion Detection Networks Architecture Design (2/2)
5. Trust Management (1/5)
5. Trust Management (2/5)
5. Trust Management (3/5)
5. Trust Management (4/5)
5. Trust Management (5/5)
6. Collaborative Decision (1/5)
6. Collaborative Decision (2/5)
6. Collaborative Decision (3/5)
6. Collaborative Decision (4/5)
6. Collaborative Decision (5/5)
7. Resource Management (1/5)
7. Resource Management (2/5)
7. Resource Management (3/5)
7. Resource Management (4/5)
7. Resource Management (5/5)
8. Collaborators Selection and Management (1/6)
8. Collaborators Selection and Management (2/6)
8. Collaborators Selection and Management (3/6)
8. Collaborators Selection and Management (4/6)
8. Collaborators Selection and Management (5/6)
8. Collaborators Selection and Management (6/6)
SECTION IV: OTHER TYPES OF IDN DESIGN
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (1/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (2/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (3/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (4/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (5/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (6/7)
9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (7/7)
10. Collaborative Malware Detection Networks (1/6)
10. Collaborative Malware Detection Networks (2/6)
10. Collaborative Malware Detection Networks (3/6)
10. Collaborative Malware Detection Networks (4/6)
10. Collaborative Malware Detection Networks (5/6)
10. Collaborative Malware Detection Networks (6/6)
SECTION V: CONCLUSION
SECTION VI: APPENDICES
A. Examples of Intrusion Detection Rules and Alerts
B. Proofs of Theorems
There are no comments on this title.