Cargando…

Understanding Intrusion Detection through Visualization

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify ongoi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Axelsson, Stefan (Autor), Sands, David (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Advances in Information Security, 24
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-0-387-27636-6
003 DE-He213
005 20220113132802.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 |a 9780387276366  |9 978-0-387-27636-6 
024 7 |a 10.1007/0-387-27636-X  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
100 1 |a Axelsson, Stefan.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Understanding Intrusion Detection through Visualization  |h [electronic resource] /  |c by Stefan Axelsson, David Sands. 
250 |a 1st ed. 2006. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2006. 
300 |a XX, 145 p. 34 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 2512-2193 ;  |v 24 
505 0 |a An Introduction to Intrusion Detection -- The Base-Rate Fallacy and the Difficulty of Intrusion Detection -- Visualizing Intrusions: Watching the Webserver -- Combining a Bayesian Classifier with Visualization: Understanding the IDS -- Visualizing the Inner Workings of a Self Learning Classifier: Improving the Usability of Intrusion Detection Systems -- Visualization for Intrusion Detection-Hooking the Worm -- Epilogue. 
520 |a With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. This volume presents four different visualization approaches, mainly applied to data from web server access logs. Understanding Intrusion Detection through Visualization is structured for security professionals, researchers and practitioners. This book is also suitable for graduate students in computer science. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Image processing-Digital techniques. 
650 0 |a Computer vision. 
650 0 |a Pattern recognition systems. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Computer networks . 
650 1 4 |a Cryptology. 
650 2 4 |a Computer Imaging, Vision, Pattern Recognition and Graphics. 
650 2 4 |a Automated Pattern Recognition. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Sands, David.  |e author.  |0 (orcid)0000-0001-6221-0503  |1 https://orcid.org/0000-0001-6221-0503  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781441939067 
776 0 8 |i Printed edition:  |z 9780387508412 
776 0 8 |i Printed edition:  |z 9780387276342 
830 0 |a Advances in Information Security,  |x 2512-2193 ;  |v 24 
856 4 0 |u https://doi.uam.elogim.com/10.1007/0-387-27636-X  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)