Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection.
1101869608
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection.
109.99 In Stock
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

by David J. Marchette
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

by David J. Marchette

Hardcover(2001)

$109.99 
  • SHIP THIS ITEM
    In stock. Ships in 6-10 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection.

Product Details

ISBN-13: 9780387952819
Publisher: Springer New York
Publication date: 06/26/2001
Series: Information Science and Statistics
Edition description: 2001
Pages: 333
Product dimensions: 0.00(w) x 0.00(h) x 0.03(d)

Table of Contents

1 TCP/IP Networking.- 2 Network Statistics.- 3 Evaluation.- 4 Network Monitoring.- 5 Host Monitoring.- 6 Computer Viruses and Worms.- 7 Trojan Programs and Covert Channels.- Appendix A WellKnown Port Numbers.- Appendix B Trojan Port Numbers.- Appendix C Country Codes.- Appendix D Security Web Sites.- D.1 Introduction.- D.2 General Information Web Sites.- D.3 Security.- D.4 Cyber Crime.- D.5 Software.- D.6 Data.- D.7 Intrusion Detection.- Acronyms.- Author Index.
From the B&N Reads Blog

Customer Reviews