The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection
Author :
Publisher : CRC Press
Total Pages : 516
Release :
ISBN-10 : 9781482203516
ISBN-13 : 1482203510
Rating : 4/5 (16 Downloads)

Book Synopsis The State of the Art in Intrusion Prevention and Detection by : Al-Sakib Khan Pathan

Download or read book The State of the Art in Intrusion Prevention and Detection written by Al-Sakib Khan Pathan and published by CRC Press. This book was released on 2014-01-29 with total page 516 pages. Available in PDF, EPUB and Kindle. Book excerpt: The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective. The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection. The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. Containing some chapters written in a tutorial style, this book is an ideal reference for graduate students, professionals, and researchers working in the field of computer and network security.


The State of the Art in Intrusion Prevention and Detection Related Books

The State of the Art in Intrusion Prevention and Detection
Language: en
Pages: 516
Authors: Al-Sakib Khan Pathan
Categories: Computers
Type: BOOK - Published: 2014-01-29 - Publisher: CRC Press

DOWNLOAD EBOOK

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, e
Practical Intrusion Analysis
Language: en
Pages: 796
Authors: Ryan Trost
Categories: Computers
Type: BOOK - Published: 2009-06-24 - Publisher: Pearson Education

DOWNLOAD EBOOK

“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.” –Nate Miller, Cofounder, Stratum Securi
Intrusion Prevention and Active Response
Language: en
Pages: 425
Authors: Michael Rash
Categories: Computers
Type: BOOK - Published: 2005-03-04 - Publisher: Elsevier

DOWNLOAD EBOOK

Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods
Intrusion Detection and Prevention for Mobile Ecosystems
Language: en
Pages: 559
Authors: Georgios Kambourakis
Categories: Computers
Type: BOOK - Published: 2017-09-06 - Publisher: CRC Press

DOWNLOAD EBOOK

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, serv
Network Intrusion Detection and Prevention
Language: en
Pages: 224
Authors: Ali A. Ghorbani
Categories: Computers
Type: BOOK - Published: 2009-10-10 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundat