Network intrusion detection and prevention concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.
Material type:
TextSeries: Advances in information security: Publisher: New York : Springer, c2010ISBN: 9780387887708 (alk. paper)Subject(s): Intrusion detection systems (Computer security) | Intrusion detection systems (Computer security) -- Case studies | Computer networks -- Security measures | Computer networks -- Security measures -- Case studiesDDC classification: 005.8 LOC classification: TK5105.59 | .G63 2010Online resources: Full text available from SpringerLink ebooks - Computer Science (2010) | Item type | Current location | Home library | Shelving location | Call number | Status | Notes | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|
Book
|
School of Mechanical & Manufacturing Engineering (SMME) | School of Mechanical & Manufacturing Engineering (SMME) | General Stacks | 005.8 GHO (Browse shelf) | Available | Rack,51-Shelf,3 | SMME-1283 |
Includes bibliographical references and index.
Network Attacks. -- Detection Approaches. -- Data Collection. -- Theoretical Foundation Of Detection. -- Architecture and Implementation. -- Alert Management and Correlation. -- Evaluation Criteria. -- Intrusion Response. -- Examples of Commercial and Open Source IDSs
License restrictions may limit access.
Intrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover.
hard cover

Book
There are no comments on this title.