Intrusion Detection in Distributed Systems 2024 pdf epub mobi 电子书


Intrusion Detection in Distributed Systems

简体网页||繁体网页

Intrusion Detection in Distributed Systems 2024 pdf epub mobi 电子书 著者简介


Intrusion Detection in Distributed Systems 电子书 图书目录




点击这里下载
    


想要找书就要到 本本书屋
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

发表于2024-12-29

Intrusion Detection in Distributed Systems 2024 pdf epub mobi 电子书

Intrusion Detection in Distributed Systems 2024 pdf epub mobi 电子书

Intrusion Detection in Distributed Systems 2024 pdf epub mobi 电子书



喜欢 Intrusion Detection in Distributed Systems 电子书 的读者还喜欢


Intrusion Detection in Distributed Systems 电子书 读后感

评分

评分

评分

评分

评分

类似图书 点击查看全场最低价
出版者:Springer
作者:Peng Ning
出品人:
页数:164
译者:
出版时间:2003-10-31
价格:USD 85.00
装帧:Hardcover
isbn号码:9781402076244
丛书系列:

图书标签:  


Intrusion Detection in Distributed Systems 2024 pdf epub mobi 电子书 图书描述

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection complements the protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. Intrusion detection techniques are traditionally categorized into two classes: anomaly detection and misuse detection. Anomaly detection is based on the normal behavior of a subject (e.g., user or a system); any action that significantly deviates from the normal behavior is considered intrusive. Misuse detection catches intrusions in terms of characteristics of known attacks or system vulnerabilities; any action that conforms to the pattern of known attack or vulnerability is considered intrusive. Alternatively, IDS may be classified into host-based IDSs, distributed IDSs, and network based IDSs according to the source of the audit information used by each IDS. Host-based IDSs get audit data from host audit trails and usually aim at detecting attacks against a single host; distributed IDSs gather audit data from multiple hosts and possibly the network and connects the hosts, aiming at detecting attacks involving multiple hosts; network-based IDSs use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science and electrical engineering.

Intrusion Detection in Distributed Systems 2024 pdf epub mobi 电子书

Intrusion Detection in Distributed Systems 2024 pdf epub mobi 电子书
想要找书就要到 本本书屋
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

Intrusion Detection in Distributed Systems 2024 pdf epub mobi 用户评价

评分

评分

评分

评分

评分

Intrusion Detection in Distributed Systems 2024 pdf epub mobi 电子书


分享链接









相关图书




本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

友情链接

© 2024 onlinetoolsland.com All Rights Reserved. 本本书屋 版权所有