|
|
|
|
LEADER |
03354nmm a2200457 u 4500 |
001 |
EB000623640 |
003 |
EBX01000000000000000476722 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
140122 ||| eng |
020 |
|
|
|a 9781461504672
|
100 |
1 |
|
|a Peng Ning
|
245 |
0 |
0 |
|a Intrusion Detection in Distributed Systems
|h Elektronische Ressource
|b An Abstraction-Based Approach
|c by Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
|
250 |
|
|
|a 1st ed. 2004
|
260 |
|
|
|a New York, NY
|b Springer US
|c 2004, 2004
|
300 |
|
|
|a XIX, 136 p
|b online resource
|
505 |
0 |
|
|a Dedication -- List of Figures -- List of Tables -- Preface -- Acknowledgments -- 1. INTRODUCTION -- 1 Computer Security and Intrusion Detection -- 2 Intrusion Detection in Distributed Systems -- 3 Summary of Contributions -- 4 Organization -- 2. AN OVERVIEW OF RELATED RESEARCH -- 3. SYSTEM VIEW AND EVENT HISTORY -- 1 System View and Event History -- 4. MODELING REQUEST AMONG COOPERATING INTRUSION DETECTION SYSTEMS -- 1 Query -- 2 Scaling to Large and Heterogeneous Environments -- 3 Discussion -- 5. EXTENDING COMMON INTRUSION DETECTION FRAMEWORK (CIDF) TO SUPPORT QUERIES -- 1 Background -- 2 A Query Facility for CIDF -- 3 Impact on CIDF -- 6. A HIERARCHICAL MODEL FOR DISTRIBUTED ATTACKS -- 1 Misuse Signature -- 2 Defining System Views Using Signatures: A Hierarchical Model -- 3 Discussion -- 7. DECENTRALIZED DETECTION OF DISTRIBUTED ATTACKS -- 1 Serializable Signatures -- 2 Detection Task and Workflow Tree -- 3 Execution of Detection Tasks -- 4 Optimization -- 5 Generating Workflow Tree -- 8. CARDS: AN EXPERIMENTAL SYSTEM FOR DETECTING DISTRIBUTED ATTACKS -- 1 CARDS Architecture -- 2 System Design Issues -- 3 Prototype Implementation -- 9. CONCLUSION -- Appendices -- References
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Artificial intelligence / Data processing
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Data Structures and Information Theory
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Engineering and Networks
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Input/Output and Data Communications
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Computer input-output equipment
|
653 |
|
|
|a Data structures (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Computer engineering
|
653 |
|
|
|a Data Science
|
700 |
1 |
|
|a Jajodia, Sushil
|e [author]
|
700 |
1 |
|
|a Wang, Xiaoyang Sean
|e [author]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b SBA
|a Springer Book Archives -2004
|
490 |
0 |
|
|a Advances in Information Security
|
028 |
5 |
0 |
|a 10.1007/978-1-4615-0467-2
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4615-0467-2?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 003.54
|
082 |
0 |
|
|a 005.73
|
520 |
|
|
|a Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation
|