000 03628cam a2200361 i 4500
999 _c9096
_d9096
001 793224635
005 20210427114547.0
008 130927s2014 flua b 001 0 eng
010 _a2013039508
020 _a9781466564121 (hardcover : alk. paper)
020 _a1466564121 (hardcover : alk. paper)
040 _aDLC
_beng
_erda
_cDLC
_dYDX
_dBTCTA
_dYDXCP
_dOCLCF
_dUtOrBLW
042 _apcc
050 0 0 _aQA76.9.A25
_bF85 2014
082 0 0 _a005.8
_223
_bF.C.I
100 1 _aFung, Carol,
_eauthor.
245 1 0 _aIntrusion detection networks :
_ba key to collaborative security /
_cCarol Fung and Raouf Boutaba.
264 1 _aBoca Raton :
_bCRC Press,
_c[2014]
300 _axxii, 239 pages ;
_c24 cm.
336 _atext
_2rdacontent.
337 _aunmediated
_2rdamedia.
338 _avolume
_2rdacarrier.
500 _acomputer bookfair2015
504 _aIncludes bibliographical references and index.
505 0 _aFront Cover Contents (1/2) Contents (2/2) List of Figures List of Tables Preface About the Authors SECTION I: INTRODUCTION (1/2) SECTION I: INTRODUCTION (2/2) SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION 2. Cyber Intrusions (1/3) 2. Cyber Intrusions (2/3) 2. Cyber Intrusions (3/3) 3. Intrusion Detection (1/4) 3. Intrusion Detection (2/4) 3. Intrusion Detection (3/4) 3. Intrusion Detection (4/4) SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK 4. Collaborative Intrusion Detection Networks Architecture Design (1/2) 4. Collaborative Intrusion Detection Networks Architecture Design (2/2) 5. Trust Management (1/5) 5. Trust Management (2/5) 5. Trust Management (3/5) 5. Trust Management (4/5) 5. Trust Management (5/5) 6. Collaborative Decision (1/5) 6. Collaborative Decision (2/5) 6. Collaborative Decision (3/5) 6. Collaborative Decision (4/5) 6. Collaborative Decision (5/5) 7. Resource Management (1/5) 7. Resource Management (2/5) 7. Resource Management (3/5) 7. Resource Management (4/5) 7. Resource Management (5/5) 8. Collaborators Selection and Management (1/6) 8. Collaborators Selection and Management (2/6) 8. Collaborators Selection and Management (3/6) 8. Collaborators Selection and Management (4/6) 8. Collaborators Selection and Management (5/6) 8. Collaborators Selection and Management (6/6) SECTION IV: OTHER TYPES OF IDN DESIGN 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (1/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (2/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (3/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (4/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (5/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (6/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (7/7) 10. Collaborative Malware Detection Networks (1/6) 10. Collaborative Malware Detection Networks (2/6) 10. Collaborative Malware Detection Networks (3/6) 10. Collaborative Malware Detection Networks (4/6) 10. Collaborative Malware Detection Networks (5/6) 10. Collaborative Malware Detection Networks (6/6) SECTION V: CONCLUSION SECTION VI: APPENDICES A. Examples of Intrusion Detection Rules and Alerts B. Proofs of Theorems
650 0 _aComputer security.
650 0 _aComputers
_xAccess control.
650 0 _aComputer networks
_xSecurity measures.
700 1 _aBoutaba, Raouf,
_eauthor.
856 4 1 _3Abstract
_uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3611
942 _2ddc
_cBK