新书报道
当前位置: 首页 >> 电类优秀教材 >> 正文
The State of the Art in Intrusion Prevention and Detection
发布日期:2015-07-16  浏览

The State of the Art in Intrusion Prevention and Detection

[BOOK DESCRIPTION]

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective. The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection. The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. Containing some chapters written in a tutorial style, this book is an ideal reference for graduate students, professionals, and researchers working in the field of computer and network security.

[TABLE OF CONTENTS]
Preface                                            ix
Acknowledgments                                    xi
Editor                                             xiii
Contributors                                       xv
  SECTION I Network Traffic Analysis and
  Management for IDS
    Chapter 1 Outlier Detection                    3   (20)
          Mohiuddin Ahmed
          Abdun Naser Mahmood
          Jiankun Hu
    Chapter 2 Network Traffic Monitoring and       23  (24)
    Analysis
          Jeferson Wilian de Godoy Stenico
          Lee Luan Ling
    Chapter 3 Using Routers and Honeypots in       47  (38)
    Combination for Collecting Internet Worm
    Attacks
          Mohssen Mohammed
          Al-Sakib Khan Pathan
    Chapter 4 Attack Severity--Based Honeynet      85  (30)
    Management Framework
          Asit More
          Shashikala Tapaswi
  SECTION II IDS Issues for Different
  Infrastructures
    Chapter 5 Intrusion Detection Systems for      115 (24)
    Critical Infrastructure
          Bernardi Pranggono
          Kieran McLaughlin
          Yi Yang
          Sakir Sezer
    Chapter 6 Cyber Security of Smart Grid         139 (16)
    Infrastructure
          Adnan Anwar
          Abdun Naser Mahmood
    Chapter 7 Intrusion Detection and              155 (32)
    Prevention in Cyber Physical Systems
          Mohamed Azab
          Mohamed Eltoweissy
    Chapter 8 Encrypted Ranked Proximity and       187 (24)
    Phrase Searching in the Cloud
          Steven Zittrower
          Cliff C. Zou
    Chapter 9 Intrusion Detection for SCADA        211 (22)
    Systems
          Alaa Atassi
          Imad H. Elhajj
          Ali Chehab
          Ayman Kayssi
    Chapter 10 Hardware Techniques for             233 (26)
    High-Performance Network Intrusion Detection
          Weirong Jiang
          Viktor K. Prasanna
  SECTION III Artificial Intelligence
  Techniques for IDS
    Chapter 11 New Unknown Attack Detection        259 (26)
    with the Neural Network--Based IDS
          Przemyslaw Kukielka
          Zbigniew Kotulski
    Chapter 12 Artificial Intelligence--Based      285 (26)
    Intrusion Detection Techniques
          Zahra Jadidi
          Vallipuram Muthukkumarasamy
          Elankayer Sithirasenan
    Chapter 13 Applications of Machine Learning    311 (24)
    in Intrusion Detection
          Yuxin Meng
          Yang Xiang
          Lam-For Kwok
  SECTION IV IDS for Wireless Systems
    Chapter 14 Introduction to Wireless            335 (26)
    Intrusion Detection Systems
          Jonny Milliken
    Chapter 15 Cross Layer--Based Intrusion        361 (30)
    Detection Techniques in Wireless Networks:
    A Survey
          Subir Halder
          Amrita Ghosal
    Chapter 16 Intrusion Detection System          391 (16)
    Architecture for Wireless Sensor Network
          Mohammad Saiful Islam Mamun
    Chapter 17 Unique Challenges in WiFi           407 (24)
    Intrusion Detection
          Jonny Milliken
    Chapter 18 Intrusion Detection Systems for     431 (18)
    (Wireless) Automation Systems
          Jana Krimmling
          Peter Langendorfer
    Chapter 19 An Innovative Approach of           449 (24)
    Blending Security Features in
    Energy-Efficient Routing for a Crowded
    Network of Wireless Sensors
          Al-Sakib Khan Pathan
          Tarem Ahmed
Index                                              473

 

关闭


版权所有:西安交通大学图书馆      设计与制作:西安交通大学数据与信息中心  
地址:陕西省西安市碑林区咸宁西路28号     邮编710049

推荐使用IE9以上浏览器、谷歌、搜狗、360浏览器;推荐分辨率1360*768以上