Network Intrusion Detection and Prevention Concepts and Techniques /

With the complexity of today's networks, it is impossible to know you are actually secure. You can prepare your network's defenses, but what threats will be thrown at it, what combinations will be tried, and what directions they will come from are all unknown variables. Most medium and lar...

Full description

Bibliographic Details
Main Authors: Ghorbani, Ali A. (Author), Lu, Wei. (Author), Tavallaee, Mahbod. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic
Language:English
Published: Boston, MA : Springer US, 2010.
Edition:First.
Series:Advances in Information Security, 47
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-0-387-88771-5
Table of Contents:
  • Network Attacks
  • Detection Approaches
  • Data Collection
  • Theoretical Foundation Of Detection
  • Architecture and Implementation
  • Alert Management and Correlation
  • Evaluation Criteria
  • Intrusion Response
  • Examples of Commercial and Open Source IDSs
  • Index.