Privacy, intrusion detection, and response technologies for protecting networks /

" This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Kabiri, Peyman, 1968-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2011.
Subjects:
Online Access:Chapter PDFs via platform:
LEADER 03500nam a2200541 a 4500
001 19352
003 IGIG
005 20111128142906.0
006 m e d
007 cr bn||||m|||a
008 111119s2011 pau fsb 000 0 eng d
010 # # |z 2011019909 
020 # # |a 9781609608378 (ebook) 
020 # # |z 9781609608361 (hardcover) 
020 # # |z 9781609608385 (print & perpetual access) 
024 7 # |a 10.4018/978-1-60960-836-1  |2 doi 
035 # # |a (CaBNVSL)gtp00550221 
035 # # |a (OCoLC)764494314 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a TK5105.59  |b .P757 2011e 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Privacy, intrusion detection, and response  |b technologies for protecting networks /  |c Peyman Kabiri, editor.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c 2011. 
300 # # |a electronic texts (241 p.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a 1. A structured approach to selecting data collection mechanisms for intrusion detection / Ulf E. Larson, Erland Jonsson and Stefan Lindskog -- 2. Protecting enterprise networks: an intrusion detection technique based on auto-reclosing / Nana K. Ampah and Cajetan M. Akujuobi -- 3. Usage of broadcast messaging in a distributed hash table for intrusion detection / Zoltán Czirkos and Gábor Hosszú -- 4. An entropy-based architecture for intrusion detection in LAN traffic / P. Velarde-Alvarado ... [et al.] -- 5. Botnet behavior detection using network synchronism / Sebastián García, Alejandro Zunino and Marcelo Campo -- 6. Detecting denial of service attacks on SIP based services and proposing solutions / Zoha Asgharian ... [et al.] -- 7. Dimension reduction and its effects on clustering for intrusion detection / Peyman Kabiri and Ali Ghorbani -- 8. A subspace-based analysis method for anomaly detection in large and high-dimensional network connection data streams / Ji Zhang -- 9. Applying weighted PCA on multiclass classification for intrusion detection / Mohsen Moshki, Mehran Garmehi and Peyman Kabiri. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a " This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed November 19, 2011). 
650 # 0 |a Computer networks  |x Security measures. 
653 # # |a Intrusion detection 
653 # # |a Anomaly detection 
653 # # |a Enterprise networks protection 
653 # # |a Distributed intrusion detection 
653 # # |a Data collection mechanisms 
653 # # |a Network feature selection 
653 # # |a Intrusion prevention 
653 # # |a Intrusion response 
653 # # |a Botnet behavior detection 
653 # # |a DoS attack detection on SIP based services 
700 1 # |a Kabiri, Peyman,  |d 1968- 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2011019909 
776 0 8 |i Print version:  |w (DLC) 2011019909  |z 9781609608361  |z 1609608364 
856 4 1 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-836-1  |3 Chapter PDFs via platform: