Udvidet returret til d. 31. januar 2025

Fault ¿ Tolerant Anomaly Detection System

Bag om Fault ¿ Tolerant Anomaly Detection System

Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the network. An Intrusion Detection System (IDS) is either software or hardware or both that attempts to perform intrusion detection and raise alarm when a possible intrusion happens. Since the 1950s enough researches on IDS have been done for the UNIX environment. Building IDS for Windows is at its infant stage. In the latter, the authenticity of a user using client applications can be governed by administrators. But abnormal usage of applications cannot be detected. The architectures commonly employed by commercial and experimental IDSs have a number of problems that limit their configurability, scalability, and efficiency. This book aims at detecting anomalous usage of legitimate applications by authorized users in the Windows environment, and to implement a fault¿tolerant architecture which continues providing detection services even in case of failure of one or more detecting servers.

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9786203581454
  • Indbinding:
  • Paperback
  • Sideantal:
  • 60
  • Udgivet:
  • 31. marts 2021
  • Størrelse:
  • 150x4x220 mm.
  • Vægt:
  • 107 g.
  • BLACK NOVEMBER
Leveringstid: 2-3 uger
Forventet levering: 2. december 2024

Beskrivelse af Fault ¿ Tolerant Anomaly Detection System

Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the network. An Intrusion Detection System (IDS) is either software or hardware or both that attempts to perform intrusion detection and raise alarm when a possible intrusion happens. Since the 1950s enough researches on IDS have been done for the UNIX environment. Building IDS for Windows is at its infant stage. In the latter, the authenticity of a user using client applications can be governed by administrators. But abnormal usage of applications cannot be detected. The architectures commonly employed by commercial and experimental IDSs have a number of problems that limit their configurability, scalability, and efficiency. This book aims at detecting anomalous usage of legitimate applications by authorized users in the Windows environment, and to implement a fault¿tolerant architecture which continues providing detection services even in case of failure of one or more detecting servers.

Brugerbedømmelser af Fault ¿ Tolerant Anomaly Detection System



Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.