Intrusion Detection in Distributed Systems: An Abstraction-Based Approach / Edition 1

Intrusion Detection in Distributed Systems: An Abstraction-Based Approach / Edition 1

ISBN-10:
140207624X
ISBN-13:
9781402076244
Pub. Date:
10/31/2003
Publisher:
Springer US
ISBN-10:
140207624X
ISBN-13:
9781402076244
Pub. Date:
10/31/2003
Publisher:
Springer US
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach / Edition 1

Intrusion Detection in Distributed Systems: An Abstraction-Based Approach / Edition 1

Hardcover

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Product Details

ISBN-13: 9781402076244
Publisher: Springer US
Publication date: 10/31/2003
Series: Advances in Information Security , #9
Edition description: 2004
Pages: 136
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

About the Author

Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA

Table of Contents

Dedication.- List of Figures.- List of Tables.- Preface.- Acknowledgments.- 1. INTRODUCTION.- 1 Computer Security and Intrusion Detection.- 2 Intrusion Detection in Distributed Systems.- 3 Summary of Contributions.- 4 Organization.- 2. AN OVERVIEW OF RELATED RESEARCH.- 3. SYSTEM VIEW AND EVENT HISTORY.- 1 System View and Event History.- 4. MODELING REQUEST AMONG COOPERATING INTRUSION DETECTION SYSTEMS.- 1 Query.- 2 Scaling to Large and Heterogeneous Environments.- 3 Discussion.- 5. EXTENDING COMMON INTRUSION DETECTION FRAMEWORK (CIDF) TO SUPPORT QUERIES.- 1 Background.- 2 A Query Facility for CIDF.- 3 Impact on CIDF.- 6. A HIERARCHICAL MODEL FOR DISTRIBUTED ATTACKS.- 1 Misuse Signature.- 2 Defining System Views Using Signatures: A Hierarchical Model.- 3 Discussion.- 7. DECENTRALIZED DETECTION OF DISTRIBUTED ATTACKS.- 1 Serializable Signatures.- 2 Detection Task and Workflow Tree.- 3 Execution of Detection Tasks.- 4 Optimization.- 5 Generating Workflow Tree.- 8. CARDS: AN EXPERIMENTAL SYSTEM FOR DETECTING DISTRIBUTED ATTACKS.- 1 CARDS Architecture.- 2 System Design Issues.- 3 Prototype Implementation.- 9. CONCLUSION.- Appendices.- References.
From the B&N Reads Blog

Customer Reviews