𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Intrusion Detection Networks: A Key to Collaborative Security

✍ Scribed by Carol Fung, Raouf Boutaba


Publisher
Auerbach Publications,CRC Press
Year
2013
Tongue
English
Leaves
261
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy.

Intrusion Detection Networks: A Key to Collaborative Security
focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutionsβ€”analyzing their scope, topology, strengths, weaknesses, and limitations.

  • Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios
  • Illustrates distributed IDN architecture design
  • Considers trust management, intrusion detection decision making, resource management, and collaborator management

The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context.

The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.


πŸ“œ SIMILAR VOLUMES


Intrusion Detection: Network Security Be
✍ Terry Escamilla πŸ“‚ Library πŸ“… 1998 πŸ› Wiley 🌐 English

<span>A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products<br> <br> Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever

Benchmarking Collaborative Networks: A K
✍ Katarzyna Rostek (auth.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing 🌐 English

<p><p>​Limited potential of financial, organizational, human and technology resources doesn't provide SMEs sufficient opportunities to access information and knowledge necessary in competition. Observing the methods and tools used by large companies, this book studies the conditions under which it w

Extrusion detection: security monitoring
✍ Bejtlich, Richard πŸ“‚ Library πŸ“… 2005;2006 πŸ› Addison-Wesley Professional 🌐 English

<b>Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks</b><br /><br />Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software.

The Tao of network security monitoring:
✍ Bejtlich, Richard;Gula, Ron(Foreword by) πŸ“‚ Library πŸ“… 2004;2010 πŸ› Addison-Wesley Professional 🌐 English

"The book you are about to read will arm you with the knowledge you need to defend your network from attackers--both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many