Utvidet returrett til 31. januar 2025

Fault ¿ Tolerant Anomaly Detection System

Om Fault ¿ Tolerant Anomaly Detection System

Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the network. An Intrusion Detection System (IDS) is either software or hardware or both that attempts to perform intrusion detection and raise alarm when a possible intrusion happens. Since the 1950s enough researches on IDS have been done for the UNIX environment. Building IDS for Windows is at its infant stage. In the latter, the authenticity of a user using client applications can be governed by administrators. But abnormal usage of applications cannot be detected. The architectures commonly employed by commercial and experimental IDSs have a number of problems that limit their configurability, scalability, and efficiency. This book aims at detecting anomalous usage of legitimate applications by authorized users in the Windows environment, and to implement a fault¿tolerant architecture which continues providing detection services even in case of failure of one or more detecting servers.

Vis mer
  • Språk:
  • Engelsk
  • ISBN:
  • 9786203581454
  • Bindende:
  • Paperback
  • Sider:
  • 60
  • Utgitt:
  • 31. mars 2021
  • Dimensjoner:
  • 150x4x220 mm.
  • Vekt:
  • 107 g.
  • BLACK NOVEMBER
  Gratis frakt
Leveringstid: 2-4 uker
Forventet levering: 12. desember 2024

Beskrivelse av Fault ¿ Tolerant Anomaly Detection System

Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the network. An Intrusion Detection System (IDS) is either software or hardware or both that attempts to perform intrusion detection and raise alarm when a possible intrusion happens. Since the 1950s enough researches on IDS have been done for the UNIX environment. Building IDS for Windows is at its infant stage. In the latter, the authenticity of a user using client applications can be governed by administrators. But abnormal usage of applications cannot be detected. The architectures commonly employed by commercial and experimental IDSs have a number of problems that limit their configurability, scalability, and efficiency. This book aims at detecting anomalous usage of legitimate applications by authorized users in the Windows environment, and to implement a fault¿tolerant architecture which continues providing detection services even in case of failure of one or more detecting servers.

Brukervurderinger av Fault ¿ Tolerant Anomaly Detection System



Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.