You are previewing Privacy, Intrusion Detection and Response.
O'Reilly logo
Privacy, Intrusion Detection and Response

Book Description

Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. List of Reviewers
  5. Preface
  6. Acknowledgment
  7. Section 1:
    1. Chapter 1: A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
      1. Abstract
      2. Introduction
      3. Related Work
      4. Data Collection for Intrusion Detection
      5. Determining What Data to Collect
      6. A Taxonomy of Mechanism Characteristics
      7. A Taxonomy of Deployment Considerations
      8. Operational Considerations
      9. Deployment Strategy
      10. Future Challenges
      11. Concluding Remarks
      12. Appendix: Classification of Mechanisms and Techniques for Data Collection
    2. Chapter 2: Protecting Enterprise Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INTRUSION DETECTION SYSTEMS
      5. INTRUSION PREVENTION SYSTEMS
      6. COMBINED INTRUSION DETECTION AND PREVENTION SYSEMS
      7. THE INTRUSION DETECTION SYSTEM TECHNIQUE
      8. DENIAL OF SERVICE ATTACKS
      9. METHOD OF APPROACH
      10. MODELING TECHNIQUE
      11. RESULTS FROM THE SIMULATION STUDIES
      12. INITIAL RESULTS
      13. FURTHER RESULTS
      14. BLOCKING ANALYSIS
      15. RECOMMENDATIONS
      16. SENSITIVITY ANALYSIS
      17. MULTIRESOLUTION TECHNIQUES
      18. FUTURE RESEARCH DIRECTIONS
      19. IMPLEMENTATION OF IDS TECHNIQUE
      20. CONCLUSION
      21. CONTRIBUTION
    3. Chapter 3: Usage of Broadcast Messaging in a Distributed Hash Table for Intrusion Detection
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. RELIABILITY OF KADEMLIA
      5. Results
      6. CONCLUSION
    4. Chapter 4: An Entropy-Based Architecture for Intrusion Detection in LAN Traffic
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. The method of remaining elements
      5. profiling the traffic
      6. EXPERIMENTAL EVALUATION
      7. FuTURE rESEARCH dIRECTIONS
      8. Conclusion
    5. Chapter 5: Botnet Behavior Detection using Network Synchronism
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. Proposed Technique
      5. DATA ACQUISITION
      6. Validation
      7. Results
      8. Conclusion
      9. FuTURE rESEARCH dIRECTIONS
    6. Chapter 6: Detecting Denial of Service Attacks on SIP Based Services and Proposing Solutions
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. Proposed Framework
      5. FuTURE rESEARCH dIRECTIONS
      6. Conclusion
  8. Section 2:
    1. Chapter 7: Dimension Reduction and its Effects on Clustering for Intrusion Detection
      1. Abstract
      2. Introduction
      3. Intrusion Detection based on Artificial Intelligence and Statistics
      4. Feature Evaluation and Dimension Reduction
      5. Effects of Dimension Reduction on Some Clustering Techniques
      6. Experimental Results
      7. Future Work
      8. Conclusion
    2. Chapter 8: A Subspace-Based Analysis Method for Anomaly Detection in Large and High-Dimensional Network Connection Data Streams
      1. Abstract
      2. INTRODUCTION
      3. Conclusions and Future Work
    3. Chapter 9: Applying Weighted PCA on Multiclass Classification for Intrusion Detection
      1. Abstract
      2. Introduction
      3. BACKGROUND
      4. FUTURE RESEARCH DIRECTIONS
      5. Conclusion
  9. Compilation of References
  10. About the Contributors