Recent Advances in Intrusion Detection
Springer Berlin (Verlag)
978-3-540-42702-5 (ISBN)
Modeling Attacks.- From Declarative Signatures to Misuse IDS.- Logging and IDS Integration.- Application-Integrated Data Collection for Security Monitoring.- Interfacing Trusted Applications with Intrusion Detection Systems.- IDS Cooperation.- Probabilistic Alert Correlation.- Designing a Web of Highly-Configurable Intrusion Detection Sensors.- Aggregation and Correlation of Intrusion-Detection Alerts.- Anomaly Detection.- Accurately Detecting Source Code of Attacks That Increase Privilege.- CDIS: Towards a Computer Immune System for Detecting Network Intrusions.- Intrusion Tolerance.- Autonomic Response to Distributed Denial of Service Attacks.- Legal Aspects.- The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information.- Specification-Based IDS.- Experiences with Specification-Based Intrusion Detection.- System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Erscheint lt. Verlag | 26.9.2001 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | X, 210 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 318 g |
Themenwelt | Informatik ► Software Entwicklung ► User Interfaces (HCI) |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
Schlagworte | Audit Control • authentication • Code • Computer • Cryptanalysis • Cryptographic Attacks • Data Mining • denial of service • Distributed Intrusion • Execution Data Mining • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Intrusion Detection • Logging • Pattern Analysis • privacy • security • Trust |
ISBN-10 | 3-540-42702-3 / 3540427023 |
ISBN-13 | 978-3-540-42702-5 / 9783540427025 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich