000 04112nam a22005895i 4500
001 978-0-387-23399-4
003 DE-He213
005 20170628033234.0
007 cr nn 008mamaa
008 100301s2005 xxu| s |||| 0|eng d
020 _a9780387233994
_9978-0-387-23399-4
024 7 _a10.1007/b101493
_2doi
050 4 _aQA76.9.D35
072 7 _aUMB
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM031000
_2bisacsh
082 0 4 _a005.74
_223
100 1 _aKruegel, Christopher.
_eauthor.
245 1 0 _aIntrusion Detection and Correlation
_h[electronic resource] :
_bChallenges and Solutions /
_cby Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.
264 1 _aBoston, MA :
_bSpringer US,
_c2005.
300 _aXIV, 118 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v14
505 0 _aComputer Security and Intrusion Detection -- Alert Correlation -- Alert Collection -- Alert Aggregation and Verification -- High-Level Alert Structures -- Large-Scale Correlation -- Evaluation -- Open Issues -- Conclusions.
520 _aINTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography. The Internet is omnipresent and companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the services they provide. Intrusion detection systems (IDSs) take increased pounding for failing to meet the expectations researchers and IDS vendors continually raise. Promises that IDSs are capable of reliably identifying malicious activity in large networks were premature and never tuned into reality. While virus scanners and firewalls have visible benefits and remain virtually unnoticed during normal operations, the situation is different with intrusion detection sensors. State-of-the-art IDSs produce hundreds or even thousands of alerts every day. Unfortunately, almost all of these alerts are false positives, that is, they are not related to security-relevant incidents. INTRUSION DETECTION AND CORRELATION: Challenges and Solutions analyzes the challenges in interpreting and combining (i.e., correlating) alerts produced by these systems. In addition, existing academic and commercial systems are classified; their advantage and shortcomings are presented, especially in the case of deployment in large, real-world sites. INTRUSION DETECTION AND CORRELATION: Challenges and Solutions is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable for graduate-level students in computer science.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 0 _aInformation systems.
650 0 _aElectronic commerce.
650 1 4 _aComputer Science.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aData Encryption.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aElectronic Commerce/e-business.
650 2 4 _aCoding and Information Theory.
700 1 _aValeur, Fredrik.
_eauthor.
700 1 _aVigna, Giovanni.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387233987
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v14
856 4 0 _uhttp://dx.doi.org/10.1007/b101493
912 _aZDB-2-SCS
999 _c14258
_d14258