Understanding Intrusion Detection Through Visualization. Advances in Information Security. (Electronic book text)

,
With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents research  on why false alarms are, and will remain a problem; then applies  results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. This  volume presents four different visualization approaches, mainly applied to data from web server access logs.

Delivery AdviceNot available

Toggle WishListAdd to wish list
Review this Item

Product Description

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents research  on why false alarms are, and will remain a problem; then applies  results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. This  volume presents four different visualization approaches, mainly applied to data from web server access logs.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Springer

Country of origin

United States

Release date

2006

Availability

We don't currently have any sources for this product. If you add this item to your wish list we will let you know when it becomes available.

Authors

,

Format

Electronic book text

Pages

157

ISBN-13

978-6610609314

Barcode

9786610609314

Categories

LSN

6610609314



Trending On Loot