Intrusion Detection in Distributed Systems 在線電子書 pdf 下載 txt下載 epub 下載 mobi 下載 2024


Intrusion Detection in Distributed Systems

簡體網頁||繁體網頁
Peng Ning 作者
Springer
譯者
2003-10-31 出版日期
164 頁數
USD 85.00 價格
Hardcover
叢書系列
9781402076244 圖書編碼

Intrusion Detection in Distributed Systems 在線電子書 圖書標籤:  


喜歡 Intrusion Detection in Distributed Systems 在線電子書 的讀者還喜歡




點擊這裡下載
    


想要找書就要到 圖書目錄大全
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

發表於2024-09-17

Intrusion Detection in Distributed Systems 在線電子書 epub 下載 mobi 下載 pdf 下載 txt 下載 2024

Intrusion Detection in Distributed Systems 在線電子書 epub 下載 pdf 下載 mobi 下載 txt 下載 2024

Intrusion Detection in Distributed Systems 在線電子書 pdf 下載 txt下載 epub 下載 mobi 下載 2024



Intrusion Detection in Distributed Systems 在線電子書 用戶評價

評分

評分

評分

評分

評分

Intrusion Detection in Distributed Systems 在線電子書 著者簡介


Intrusion Detection in Distributed Systems 在線電子書 著者簡介


Intrusion Detection in Distributed Systems 在線電子書 pdf 下載 txt下載 epub 下載 mobi 在線電子書下載

Intrusion Detection in Distributed Systems 在線電子書 圖書描述

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection complements the protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. Intrusion detection techniques are traditionally categorized into two classes: anomaly detection and misuse detection. Anomaly detection is based on the normal behavior of a subject (e.g., user or a system); any action that significantly deviates from the normal behavior is considered intrusive. Misuse detection catches intrusions in terms of characteristics of known attacks or system vulnerabilities; any action that conforms to the pattern of known attack or vulnerability is considered intrusive. Alternatively, IDS may be classified into host-based IDSs, distributed IDSs, and network based IDSs according to the source of the audit information used by each IDS. Host-based IDSs get audit data from host audit trails and usually aim at detecting attacks against a single host; distributed IDSs gather audit data from multiple hosts and possibly the network and connects the hosts, aiming at detecting attacks involving multiple hosts; network-based IDSs use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science and electrical engineering.

Intrusion Detection in Distributed Systems 在線電子書 下載 mobi epub pdf txt 在線電子書下載


想要找書就要到 圖書目錄大全
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

Intrusion Detection in Distributed Systems 在線電子書 讀後感

評分

評分

評分

評分

評分

類似圖書 點擊查看全場最低價

Intrusion Detection in Distributed Systems 在線電子書 pdf 下載 txt下載 epub 下載 mobi 下載 2024


分享鏈接





Intrusion Detection in Distributed Systems 在線電子書 相關圖書




本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

友情鏈接

© 2024 book.wenda123.org All Rights Reserved. 圖書目錄大全 版權所有