Managing Cyber Threats: Issues, Approaches, and Challenges

 Buch
Besorgungstitel | Lieferzeit:3-5 Tage I
ISBN-13:
9780387242262
Einband:
Buch
Erscheinungsdatum:
01.06.2005
Seiten:
330
Autor:
Vipin Kumar
Gewicht:
667 g
Format:
234x156x21 mm
Serie:
5, Massive Computing
Sprache:
Englisch
Beschreibung:

Provides a good blend of in-depth surveys and details of specific technologies from the academic and industrial world. Many of the approaches have been successfully deployed at many academic, military, and commercial organizations
Overview.- Managing Threats to Web Databases and Cyber Systems.- Intrusion Detection: A Survey.- Data Mining Based Analysis of Computer Attacks.- Learning Rules and Clusters for Anomaly Detection in Network Traffic.- Statistical Causality Analysis of Infosec Alert Data.- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization.- Techniques for Managing Cyber Vulnerabilities and Alerts.- Early Detection of Active Internet Worms.- Sensor Families for Intrusion Detection Infrastructures.- Encapsulation of User's Intent: A New Proactive Intrusion Assessment Paradigm.- Topological Analysis of Network Attack Vulnerability.- Analyzing Survivable Computation in Critical Infrastructures.- Alert Management Systems: A Quick Introduction.- Cyber Forensics.- Cyber Forensics: Managing, Modeling, and Mining Data for Investigation.- Cyber Forensics: Issues and Approaches.
Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga