Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Intrusion DetectionMarch 1999
Publisher:
  • Intrusion.Net Books
ISBN:978-0-9666700-7-3
Published:01 March 1999
Pages:
218
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher: The proliferation of cracking activity on the Internet has led to astounding developments in intrusion detection technology. This book will lead you through the details and methodologies associated with this important type of security protection. System administrators, programmers, system and software engineers, and managers of technology will find this book invaluable. And anyone associated with information assurance for critical infrastructures will learn how intrusion detection can be applied to their unique security needs. With this book, you will learn about intrusion detection topics including: Commercial tools for intrusion detection Strategies for processing security audit trails Correlation techniques and algorithms Intruder trace back techniques Deception-based honey pots and traps Incident response and disaster recovery

Cited By

  1. Ghasemigol M, Monsefi R and Sadoghi-Yazdi H (2018). Intrusion Detection by Ellipsoid Boundary, Journal of Network and Systems Management, 18:3, (265-282), Online publication date: 1-Sep-2010.
  2. Helmer G, Wong J, Slagell M, Honavar V, Miller L, Wang Y, Wang X and Stakhanova N (2007). Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems, International Journal of Information and Computer Security, 1:1/2, (109-142), Online publication date: 1-Jan-2007.
  3. Znati T, Amadei J, Pazehoski D and Sweeny S Design and Analysis of an Adaptive, Global Strategy for Detecting and Mitigating Distributed DoS Attacks in GRID Environments Proceedings of the 39th annual Symposium on Simulation, (2-9)
  4. Cook D, Hartnett J, Manderson K and Scanlan J Catching spam before it arrives Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54, (193-202)
  5. Kim D, Jung Y and Chung T (2005). PRISM, The Journal of Supercomputing, 33:1, (103-121), Online publication date: 1-Jul-2005.
  6. Picó F, Olivo A, Crespi F and Camara A An electronic reconfigurable neural architecture for intrusion detection Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II, (376-384)
  7. Li M, Liu J and Long D Probability principle of a reliable approach to detect signs of DDOS flood attacks Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies, (596-599)
  8. Lee J, Jung J, Park J and Chi S Linux-Based system modelling for cyber-attack simulation Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (585-596)
  9. Lee J, Lee M, Lee J, Chi S and Ohn S Automated cyber-attack scenario generation using the symbolic simulation Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (380-389)
  10. ACM
    Wang D, Madan B and Trivedi K Security analysis of SITAR intrusion tolerance system Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security, (23-32)
  11. Cabrera J, Lewis L, Qin X, Lee W and Mehra R (2002). Proactive Intrusion Detection and Distributed Denial of Service Attacks—A Case Study in Security Management, Journal of Network and Systems Management, 10:2, (225-254), Online publication date: 1-Jun-2002.
  12. ACM
    Lee W and Fan W (2019). Mining system audit data, ACM SIGMOD Record, 30:4, (35-44), Online publication date: 1-Dec-2001.
  13. Alvisi L, Malkhi D, Pierce E and Reiter M (2001). Fault Detection for Byzantine Quorum Systems, IEEE Transactions on Parallel and Distributed Systems, 12:9, (996-1007), Online publication date: 1-Sep-2001.
Contributors
  • Nokia Bell Labs

Recommendations