did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780387887708

Network Intrusion Detection and Prevention

by ; ;
  • ISBN13:

    9780387887708

  • ISBN10:

    0387887709

  • Format: Hardcover
  • Copyright: 2009-09-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $169.99 Save up to $119.70
  • Digital
    $108.96
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

With the complexity of today's networks, it is impossible to know you are actually secure. You can prepare your network's defenses, but what threats will be thrown at it, what combinations will be tried, and what directions they will come from are all unknown variables. Most medium and large-scale network infrastructures include multiple high-speed connections to the Internet and support many customer collaborative networks, thousands of internal users and various web servers. Many of these systems are faced with an ever-increasing likelihood of unplanned downtime due to various attacks and security breaches. In this environment of uncertainty, which is full of hackers and malicious threats, those systems that are the best at maintaining the continuity of their services (i.e., survive the attacks) enjoy a significant competitive advantage. Minimizing unexpected and unplanned downtime can be done by identifying, prioritizing and defending against misuse, attacks and vulnerabilities.

Table of Contents

Network Attacksp. 1
Attack Taxonomiesp. 2
Probesp. 4
EPSweep and PortSweepp. 5
NMapp. 5
MScanp. 5
SAINTp. 5
Satanp. 6
Privilege Escalation Attacksp. 6
Buffer Overflow Attacksp. 7
Misconfiguration Attacksp. 7
Race-condition Attacksp. 8
Man-in-the-Middle Attacksp. 9
Social Engineering Attacksp. 10
Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacksp. 11
Detection Approaches for DoS and DDoS Attacksp. 11
Prevention and Response for DoS and DDoS Attacksp. 13
Examples of DoS and DDoS Attacksp. 14
Worms Attacksp. 16
Modeling and Analysis of Worm Behaviorsp. 16
Detection and Monitoring of Worm Attacksp. 17
Worms Containmentp. 18
Examples of Well Known Worm Attacksp. 19
Routing Attacksp. 19
OSPF Attacksp. 20
BGP Attacksp. 21
Referencesp. 22
Detection Approachesp. 27
Misuse Detectionp. 27
Pattern Matchingp. 28
Rule-based Techniquesp. 29
State-based Techniquesp. 31
Techniques based on Data Miningp. 34
Anomaly Detectionp. 34
Advanced Statistical Modelsp. 36
Rule based Techniquesp. 37
Biological Modelsp. 39
Learning Modelsp. 40
Specification-based Detectionp. 45
Hybrid Detectionp. 46
Referencesp. 49
Data Collectionp. 55
Data Collection for Host-Based IDSsp. 55
Audit Logsp. 56
System Call Sequencesp. 58
Data Collection for Network-Based IDSsp. 61
SNMPp. 61
Packetsp. 62
Limitations of Network-Based IDSsp. 66
Data Collection for Application-Based IDSsp. 67
Data Collection for Application-Integrated IDSsp. 68
Hybrid Data Collectionp. 69
Referencesp. 69
Theoretical Foundation of Detectionp. 73
Taxonomy of Anomaly Detection Systemsp. 73
Fuzzy Logicp. 75
Fuzzy Logic in Anomaly Detectionp. 77
Bayes Theoryp. 77
Naive Bayes Classifierp. 78
Bayes Theory in Anomaly Detectionp. 78
Artificial Neural Networksp. 79
Processing Elementsp. 79
Connectionsp. 82
Network Architecturesp. 83
Learning Processp. 84
Artificial Neural Networks in Anomaly Detectionp. 85
Support Vector Machine (SVM)p. 86
Support Vector Machine in Anomaly Detectionp. 89
Evolutionary Computationp. 89
Evolutionary Computation in Anomaly Detectionp. 91
Association Rulesp. 92
The Apriori Algorithmp. 93
Association Rules in Anomaly Detectionp. 93
Clusteringp. 94
Taxonomy of Clustering Algorithmsp. 95
K-Means Clusteringp. 96
Y-Means Clusteringp. 97
Maximum-Likelihood Estimatesp. 98
Unsupervised Learning of Gaussian Datap. 100
Clustering Based on Density Distribution Functionsp. 101
Clustering in Anomaly Detectionp. 102
Signal Processing Techniques Based Modelsp. 104
Comparative Study of Anomaly Detection Techniquesp. 109
Referencesp. 110
Architecture and Implementationp. 115
Centralizedp. n5
Distributedp. 115
Intelligent Agentsp. 116
Mobile Agentsp. 123
Cooperative Intrusion Detectionp. 125
Referencesp. 126
Alert Management and Correlationp. 129
Data Fusionp. 129
Alert Correlationp. 131
Preprocessp. 132
Correlation Techniquesp. 139
Postprocessp. 145
Alert Correlation Architecturesp. 150
Validation of Alert Correlation Systemsp. 152
Cooperative Intrusion Detectionp. 153
Basic Principles of Information Sharingp. 153
Cooperation Based on Goal-tree Representation of Attack Strategiesp. 154
Cooperative Discovery of Intrusion Chainp. 154
Abstraction-Based Intrusion Detectionp. 155
Interest-Biased Communication and Cooperationp. 155
Agent-Based Cooperationp. 156
Secure Communication Using Public-key Encryptionp. 157
Referencesp. 157
Evaluation Criteriap. 161
Accuracyp. 161
False Positive and Negativep. 162
Confusion Matrixp. 163
Precision, Recall, and F-Measurep. 164
ROC Curvesp. 166
The Base-Rate Fallacyp. 168
Performancep. 171
Completenessp. 172
Timely Responsep. 172
Adaptation and Cost-Sensitivityp. 175
Intrusion Tolerance and Attack Resistancep. 177
Redundant and Fault Tolerance Designp. 177
Obstructing Methodsp. 179
Test, Evaluation and Data Setsp. 180
Referencesp. 182
Intrusion Responsep. 185
Response Typep. 185
Passive Alerting and Manual Responsep. 185
Active Responsep. 186
Response Approachp. 186
Decision Analysisp. 186
Control Theoryp. 189
Game theoryp. 189
Fuzzy theoryp. 190
Survivability and Intrusion Tolerancep. 194
Referencesp. 197
Examples of Commercial and Open Source IDSsp. 199
Bro Intrusion Detection Systemp. 199
Prelude Intrusion Detection Systemp. 199
Snort Intrusion Detection Systemp. 200
Ethereal Application - Network Protocol Analyzerp. 200
Multi Router Traffic Grapher (MRTG)p. 201
Tamandua Network Intrusion Detection Systemp. 202
Other Commercial IDSsp. 202
Indexp. 209
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program