๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Understanding Intrusion Detection through Visualization

โœ Scribed by Stefan Axelsson, David Sands


Publisher
Springer
Year
2005
Tongue
English
Leaves
156
Series
Advances in Information Security
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


In the beginning I was a bit mislead by the title of this book, but I guess that was my mistake: The book is not about visualizing intrusion detection system logs, but it is about how to do intrusion detection on mainly Web server logs. The book is based on some older papers of the author. However, he added some new content and revised some of the papers contents.
For the most part, the book talks about how to visualize the output of various data processing algorithms. Bayesian analysis is used to analyze Web server logs and the author shows how the output can be visualized. It is not necessary visualization that is used to do intrusion detection, but the book shows a way to visualize the output of data analysis algorithms.
Overall I am a bit disappointed with the book. It is a collection of Axelsson's older papers. The book would benefit from integrating the chapters more tightely. Common terminology and concepts could be introduced once instead of multiple times in each of the chapters.
Reading the first chapters took quite some concentration. The definition of intrusion detection and intrusion detection systems in the beginning of the book are fairly complicated and it is not entirely clear why the complicated definitions are necessary for rest of the book. Also, for a visualization book, the graphs are of fairly poor quality.


๐Ÿ“œ SIMILAR VOLUMES


Understanding Intrusion Detection Throug
โœ Dr. Stefan Axelsson, Prof. David Sands (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer US ๐ŸŒ English

<p><P>With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify

Understanding Intrusion Detection Throug
โœ Dr. Stefan Axelsson, Prof. David Sands (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer US ๐ŸŒ English

<p><P>With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify

Intrusion Detection Honeypots: Detection
โœ Chris Sanders ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Applied Network Defense ๐ŸŒ English

<span>The foundational guide for using deception against computer network adversaries. <br><br> When an attacker breaks into your network, you have a home-field advantage. But how do you use it? <br><br>Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring ho

Extrusion detection: security monitoring
โœ Bejtlich, Richard ๐Ÿ“‚ Library ๐Ÿ“… 2005;2006 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

<b>Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks</b><br /><br />Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software.