Privacy-Respecting Intrusion Detection Privacy-Respecting Intrusion Detection
Advances in Information Security

Privacy-Respecting Intrusion Detection

    • €119.99
    • €119.99

Publisher Description

With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond to misuse or abusive activity in IT systems, one needs to establish the capability to detect and understand improper activity. Intrusion Detection Systems observe activity occurring in the IT system, record these observations in audit data, and analyze collected audit data to detect misuse. Collecting and processing audit data for misuse detection conflicts with expectations and rights of system users regarding their privacy. A viable solution is replacing personal data with pseudonyms in audit data.

Privacy-Respecting Intrusion Detection introduces technical purpose binding, restricting the linkability of pseudonyms in audit data, to the amount required for misuse detection. Also, it limits the recovery of original personal data to pseudonyms involved in a detected misuse scenario. This book includes case studies with constructively validated solutions by providing algorithms.


Privacy-Respecting Intrusion Detection is designed for a professional audience, composed of practitioners and researchers in industry. This book is also suitable as an advance-level text in the computer science field.

Foreword by Richard Kemmerer, University of California, Santa Barbara, USA

GENRE
Computing & Internet
RELEASED
2007
28 August
LANGUAGE
EN
English
LENGTH
327
Pages
PUBLISHER
Springer US
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
3.5
MB
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2011
Advances in Cyber Security: Principles, Techniques, and Applications Advances in Cyber Security: Principles, Techniques, and Applications
2018
Data Privacy Management, and Security Assurance Data Privacy Management, and Security Assurance
2016
Security, Privacy, and Trust in Modern Data Management Security, Privacy, and Trust in Modern Data Management
2007
Data Privacy Management, Cryptocurrencies and Blockchain Technology Data Privacy Management, Cryptocurrencies and Blockchain Technology
2017
Handbook of Database Security Handbook of Database Security
2007
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024
Security and Risk Analysis for Intelligent Edge Computing Security and Risk Analysis for Intelligent Edge Computing
2023