50
Used, New, and Out of Print Books - We Buy and Sell - Powell's Books
Cart |
|  my account  |  wish list  |  help   |  800-878-7323
Hello, | Login
MENU
  • Browse
    • New Arrivals
    • Bestsellers
    • Featured Preorders
    • Award Winners
    • Audio Books
    • See All Subjects
  • Used
  • Staff Picks
    • Staff Picks
    • Picks of the Month
    • Bookseller Displays
    • 50 Books for 50 Years
    • 25 Best 21st Century Sci-Fi & Fantasy
    • 25 PNW Books to Read Before You Die
    • 25 Books From the 21st Century
    • 25 Memoirs to Read Before You Die
    • 25 Global Books to Read Before You Die
    • 25 Women to Read Before You Die
    • 25 Books to Read Before You Die
  • Gifts
    • Gift Cards & eGift Cards
    • Powell's Souvenirs
    • Journals and Notebooks
    • socks
    • Games
  • Sell Books
  • Blog
  • Events
  • Find A Store

Don't Miss

  • Scientifically Proven Sale
  • Staff Top Fives of 2022
  • Best Books of 2022
  • Powell's Author Events
  • Oregon Battle of the Books
  • Audio Books

Visit Our Stores

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##

Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

by Peng Ning and Sushil Jajodia and Xiaoyang Sean Wang
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

  • Comment on this title
  • Synopses & Reviews

ISBN13: 9781402076244
ISBN10: 140207624X



All Product Details

View Larger ImageView Larger Images
Ships free on qualified orders.
Add to Cart
$77.95
New Hardcover
Available at a Remote Warehouse. Ships separately from other items. Additional shipping charges may apply. Not available for In Store Pickup. More Info
Add to Wishlist
QtyStore
20Remote Warehouse

Synopses & Reviews

Publisher Comments

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection complements the protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. Intrusion detection techniques are traditionally categorized into two classes: anomaly detection and misuse detection. Anomaly detection is based on the normal behavior of a subject (e.g., user or a system); any action that significantly deviates from the normal behavior is considered intrusive. Misuse detection catches intrusions in terms of characteristics of known attacks or system vulnerabilities; any action that conforms to the pattern of known attack or vulnerability is considered intrusive. Alternatively, IDS may be classified into host-based IDSs, distributed IDSs, and network based IDSs according to the source of the audit information used by each IDS. Host-based IDSs get audit data from host audit trails and usually aim at detecting attacks against a single host; distributed IDSs gather audit data from multiple hosts and possibly the network and connects the hosts, aiming at detecting attacks involving multiple hosts; network-based IDSs use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science and electrical engineering.

Synopsis

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms as a second line of defense that protects information systems. Even if preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. This book unites three research contributions detailing new approaches that are superior to existing centralized or hierarchical approaches.

Synopsis

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

About the Author

Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA

Table of Contents

Dedication. List of Figures. List of Tables. Preface. Acknowledgments. 1: Introduction. 2: An Overview of Related Research. 3: System View and Event History. 4: Modeling Request Among Cooperating Intrusion Detection Systems. 5: Extending Common Intrusion Detection Framework (CIDF) to Support Queries. 6: A Hierarchical Model for Distributed Attacks. 7: Decentralized Detection of Distributed Attacks. 8: CARDS: An Experimental System for Detecting Distributed Attacks. 9: Conclusion. Appendices: A. B. References. Index.


What Our Readers Are Saying

Be the first to share your thoughts on this title!




Product Details

ISBN:
9781402076244
Binding:
Hardcover
Publication date:
10/31/2003
Publisher:
Springer
Series info:
Advances in Information Security
Language:
English
Pages:
136
Height:
.56IN
Width:
6.40IN
LCCN:
2003055885
Series:
Advances in Information Security
Series Number:
9
Number of Units:
1
Copyright Year:
2003
Series Volume:
619
UPC Code:
2801402076246
Author:
Sushil Jajodia
Author:
Ning Peng Ning
Author:
Xiaoyang Sean Wang
Author:
Peng Ning
Author:
X. Sean Wang
Author:
Peng Ning
Subject:
General-General
Subject:
Data structures
Subject:
Computer crimes
Subject:
Computers -- Access control.
Subject:
Computer Systems Organization and Communication Networks
Subject:
Computer Communication Networks
Subject:
Input/Output and Data Communications
Subject:
Computer networks
Subject:
Computer networks -- Security measures.
Subject:
Computers
Subject:
Data encryption.
Subject:
Data Structures, Cryptology and Information Theory

Ships free on qualified orders.
Add to Cart
$77.95
New Hardcover
Available at a Remote Warehouse. Ships separately from other items. Additional shipping charges may apply. Not available for In Store Pickup. More Info
Add to Wishlist
QtyStore
20Remote Warehouse
Used Book Alert for book Receive an email when this ISBN is available used.

This title in other editions

  • New, Trade Paperback, $83.95
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
  • Twitter
  • Facebook
  • Pinterest
  • Instagram

  • Help
  • Guarantee
  • My Account
  • Careers
  • About Us
  • Security
  • Wish List
  • Partners
  • Contact Us
  • Shipping
  • Transparency ACT MRF
  • Sitemap
  • © 2023 POWELLS.COM Terms

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##