Managing Cyber Threats Issues, Approaches, and Challenges

Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In rec...

Full description

Bibliographic Details
Other Authors: Kumar, Vipin (Editor), Srivastava, Jaideep (Editor), Lazarevic, Aleksandar (Editor)
Format: eBook
Language:English
Published: New York, NY Springer US 2005, 2005
Edition:1st ed. 2005
Series:Massive Computing
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Overview
  • Managing Threats to Web Databases and Cyber Systems
  • Intrusion Detection: A Survey
  • Data Mining Based Analysis of Computer Attacks
  • Learning Rules and Clusters for Anomaly Detection in Network Traffic
  • Statistical Causality Analysis of Infosec Alert Data
  • Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization
  • Techniques for Managing Cyber Vulnerabilities and Alerts
  • Early Detection of Active Internet Worms
  • Sensor Families for Intrusion Detection Infrastructures
  • Encapsulation of User’s Intent: A New Proactive Intrusion Assessment Paradigm
  • Topological Analysis of Network Attack Vulnerability
  • Analyzing Survivable Computation in Critical Infrastructures
  • Alert Management Systems: A Quick Introduction
  • Cyber Forensics
  • Cyber Forensics: Managing, Modeling, and Mining Data for Investigation
  • Cyber Forensics: Issues and Approaches