Intrusion Detection and Correlation Intrusion Detection and Correlation
Advances in Information Security

Intrusion Detection and Correlation

Challenges and Solutions

    • US$ 129,99
    • US$ 129,99

Descrição da editora

INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced.  This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography. 


The Internet is omnipresent and companies have increasingly put critical resources online.  This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the services they provide.  Intrusion detection systems (IDSs) take increased pounding for failing to meet the expectations researchers and IDS vendors continually raise.  Promises that IDSs are capable of reliably identifying malicious activity in large networks were premature and never tuned into reality. 

While virus scanners and firewalls have visible benefits and remain virtually unnoticed during normal operations, the situation is different with intrusion detection sensors.  State-of-the-art IDSs produce hundreds or even thousands of alerts every day.  Unfortunately, almost all of these alerts are false positives, that is, they are not related to security-relevant incidents.


INTRUSION DETECTION AND CORRELATION: Challenges and Solutions analyzes the challenges in interpreting and combining (i.e., correlating) alerts produced by these systems.  In addition, existing academic and commercial systems are classified; their advantage and shortcomings are presented, especially in the case of deployment in large, real-world sites.


INTRUSION DETECTION AND CORRELATION: Challenges and Solutions is designed for a professional audience composed of researchers and practitioners in industry.   This book is also suitable for graduate-level students in computer science.

GÊNERO
Computadores e Internet
LANÇADO
2005
30 de dezembro
IDIOMA
EN
Inglês
PÁGINAS
132
EDITORA
Springer US
VENDEDOR
Springer Nature B.V.
TAMANHO
1,1
MB
Intelligent Security Systems Intelligent Security Systems
2021
Collaborative Financial Infrastructure Protection Collaborative Financial Infrastructure Protection
2012
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009
DYNAMICALLY ENABLED CYBER DEFENSE DYNAMICALLY ENABLED CYBER DEFENSE
2021
Computer System and Network Security Computer System and Network Security
2017
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015
Einführung in die Technische Informatik Einführung in die Technische Informatik
2006
Recent Advances in Intrusion Detection Recent Advances in Intrusion Detection
2007
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007