rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780387343464

Privacy-respecting Intrusion Detection

by
  • ISBN13:

    9780387343464

  • ISBN10:

    0387343466

  • Format: Hardcover
  • Copyright: 2007-10-15
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $179.99 Save up to $144.35
  • Digital
    $77.22*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

With our society's growing dependency on information technology systems (IT), the issue of IT Security becomes increasingly important. IT security cannot be achieved by means of preventive safeguards alone. To properly respond to misuse or abusive activity in IT systems, one needs to establish the capability to detect and understand improper activity. Intrusion Detection Systems (IDSs) observe activity occurring in the IT system, record these observations in audit data, and analyze the collected audit data in order to detect misuse. The collection and processing of audit data for misuse detection conflicts with the expectation and the rights of the system users regarding their privacy. A viable solution is replacing personal data with pseudonyms in audit data. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data, to the amount necessary for misuse detection. Also, it limits the recovery of the original personal data to pseudonyms involved in a detected misuse scenario. This book includes case studies demonstrating this theory and solutions that are constructively validated by providing algorithms. Privacy-Respecting Intrusion Detection is designed for a professional audience, composed of practitioners and researchers in industry. This book is also suitable as an advance-level text in the computer science field. Foreword by Richard Kemmerer, University of California, Santa Barbara, USA.

Table of Contents

Introduction and Background
Introductionp. 3
Authorizationsp. 9
An Architectural Model for Secure Authorizationsp. 13
Traditional Security Objectivesp. 27
Personal Data Protection Objectivesp. 31
Technical Enforcement of Multilateral Securityp. 43
Pseudonyms - A Technical Point of Viewp. 47
An Architectural Model for Pseudonymous Authorizationsp. 55
Comparing Architecturesp. 65
Audit Data Pseudonymizationp. 77
Set-based Approach
Requirements, Assumptions and Trust Modelp. 91
Modeling Conditions for Technical Purpose Bindingp. 97
Cryptographic Enforcement of Disclosure Conditionsp. 103
The Mismatch Problemp. 109
Operational Pseudonymization and Pseudonym Disclosurep. 115
Extensionsp. 123
Application to Unix Audit Data
Unix Audit Datap. 137
Syslogp. 141
Instantiating the Set-based Approach for Syslog Audit Datap. 147
Implementation: Pseudo/CoRep. 159
Evaluation
APES: Anonymity and Privacy in Electronic Servicesp. 171
Evaluating the Design Using Basic Building Blocksp. 177
Evaluating the Performance of the Implementationp. 187
Refinement of Misuse Scenario Models
Motivating Model Refinementsp. 199
Models of Misuse Scenariosp. 203
Pseudonymization Based on Serial Signature-Netsp. 229
Pseudonym Linkabilityp. 233
Pseudonym Disclosurep. 247
Summaryp. 283
Threshold Schemes for Cryptographic Secret Sharingp. 285
Referencesp. 287
Indexp. 303
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program