Intrusion Detection in Distributed Systems An Abstraction-Based Approach

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environ...

Full description

Bibliographic Details
Main Authors: Peng Ning, Jajodia, Sushil (Author), Wang, Xiaoyang Sean (Author)
Format: eBook
Language:English
Published: New York, NY Springer US 2004, 2004
Edition:1st ed. 2004
Series:Advances in Information Security
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 03354nmm a2200457 u 4500
001 EB000623640
003 EBX01000000000000000476722
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9781461504672 
100 1 |a Peng Ning 
245 0 0 |a Intrusion Detection in Distributed Systems  |h Elektronische Ressource  |b An Abstraction-Based Approach  |c by Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang 
250 |a 1st ed. 2004 
260 |a New York, NY  |b Springer US  |c 2004, 2004 
300 |a XIX, 136 p  |b online resource 
505 0 |a Dedication -- List of Figures -- List of Tables -- Preface -- Acknowledgments -- 1. INTRODUCTION -- 1 Computer Security and Intrusion Detection -- 2 Intrusion Detection in Distributed Systems -- 3 Summary of Contributions -- 4 Organization -- 2. AN OVERVIEW OF RELATED RESEARCH -- 3. SYSTEM VIEW AND EVENT HISTORY -- 1 System View and Event History -- 4. MODELING REQUEST AMONG COOPERATING INTRUSION DETECTION SYSTEMS -- 1 Query -- 2 Scaling to Large and Heterogeneous Environments -- 3 Discussion -- 5. EXTENDING COMMON INTRUSION DETECTION FRAMEWORK (CIDF) TO SUPPORT QUERIES -- 1 Background -- 2 A Query Facility for CIDF -- 3 Impact on CIDF -- 6. A HIERARCHICAL MODEL FOR DISTRIBUTED ATTACKS -- 1 Misuse Signature -- 2 Defining System Views Using Signatures: A Hierarchical Model -- 3 Discussion -- 7. DECENTRALIZED DETECTION OF DISTRIBUTED ATTACKS -- 1 Serializable Signatures -- 2 Detection Task and Workflow Tree -- 3 Execution of Detection Tasks -- 4 Optimization -- 5 Generating Workflow Tree -- 8. CARDS: AN EXPERIMENTAL SYSTEM FOR DETECTING DISTRIBUTED ATTACKS -- 1 CARDS Architecture -- 2 System Design Issues -- 3 Prototype Implementation -- 9. CONCLUSION -- Appendices -- References 
653 |a Computer Communication Networks 
653 |a Artificial intelligence / Data processing 
653 |a Cryptography 
653 |a Data Structures and Information Theory 
653 |a Computer networks  
653 |a Computer Engineering and Networks 
653 |a Information theory 
653 |a Input/Output and Data Communications 
653 |a Data encryption (Computer science) 
653 |a Computer input-output equipment 
653 |a Data structures (Computer science) 
653 |a Cryptology 
653 |a Computer engineering 
653 |a Data Science 
700 1 |a Jajodia, Sushil  |e [author] 
700 1 |a Wang, Xiaoyang Sean  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Advances in Information Security 
028 5 0 |a 10.1007/978-1-4615-0467-2 
856 4 0 |u https://doi.org/10.1007/978-1-4615-0467-2?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 003.54 
082 0 |a 005.73 
520 |a Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation