TY - BOOK AU - Fung,Carol AU - Boutaba,Raouf TI - Intrusion detection networks: a key to collaborative security SN - 9781466564121 (hardcover : alk. paper) AV - QA76.9.A25 F85 2014 U1 - 005.8 23 PY - 2014///] CY - Boca Raton PB - CRC Press KW - Computer security KW - Computers KW - Access control KW - Computer networks KW - Security measures N1 - computer bookfair2015; Includes bibliographical references and index; Front Cover Contents (1/2) Contents (2/2) List of Figures List of Tables Preface About the Authors SECTION I: INTRODUCTION (1/2) SECTION I: INTRODUCTION (2/2) SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION 2. Cyber Intrusions (1/3) 2. Cyber Intrusions (2/3) 2. Cyber Intrusions (3/3) 3. Intrusion Detection (1/4) 3. Intrusion Detection (2/4) 3. Intrusion Detection (3/4) 3. Intrusion Detection (4/4) SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK 4. Collaborative Intrusion Detection Networks Architecture Design (1/2) 4. Collaborative Intrusion Detection Networks Architecture Design (2/2) 5. Trust Management (1/5) 5. Trust Management (2/5) 5. Trust Management (3/5) 5. Trust Management (4/5) 5. Trust Management (5/5) 6. Collaborative Decision (1/5) 6. Collaborative Decision (2/5) 6. Collaborative Decision (3/5) 6. Collaborative Decision (4/5) 6. Collaborative Decision (5/5) 7. Resource Management (1/5) 7. Resource Management (2/5) 7. Resource Management (3/5) 7. Resource Management (4/5) 7. Resource Management (5/5) 8. Collaborators Selection and Management (1/6) 8. Collaborators Selection and Management (2/6) 8. Collaborators Selection and Management (3/6) 8. Collaborators Selection and Management (4/6) 8. Collaborators Selection and Management (5/6) 8. Collaborators Selection and Management (6/6) SECTION IV: OTHER TYPES OF IDN DESIGN 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (1/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (2/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (3/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (4/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (5/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (6/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (7/7) 10. Collaborative Malware Detection Networks (1/6) 10. Collaborative Malware Detection Networks (2/6) 10. Collaborative Malware Detection Networks (3/6) 10. Collaborative Malware Detection Networks (4/6) 10. Collaborative Malware Detection Networks (5/6) 10. Collaborative Malware Detection Networks (6/6) SECTION V: CONCLUSION SECTION VI: APPENDICES A. Examples of Intrusion Detection Rules and Alerts B. Proofs of Theorems UR - http://repository.fue.edu.eg/xmlui/handle/123456789/3611 ER -