Computer intrusion detection and network monitoring: a statistical viewpoint
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
Springer
2001
|
Schriftenreihe: | Statistics for engineering and information science
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVII, 332 S. Ill., graph. Darst. |
ISBN: | 0387952810 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013892251 | ||
003 | DE-604 | ||
005 | 20010918 | ||
007 | t| | ||
008 | 010905s2001 xx ad|| |||| 00||| eng d | ||
016 | 7 | |a 962207586 |2 DE-101 | |
020 | |a 0387952810 |9 0-387-95281-0 | ||
035 | |a (OCoLC)46809755 | ||
035 | |a (DE-599)BVBBV013892251 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-824 |a DE-739 |a DE-384 |a DE-522 |a DE-634 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Marchette, David J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer intrusion detection and network monitoring |b a statistical viewpoint |c David J. Marchette |
264 | 1 | |a New York [u.a.] |b Springer |c 2001 | |
300 | |a XVII, 332 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Statistics for engineering and information science | |
650 | 4 | |a Computer networks |x Monitoring | |
650 | 4 | |a Computer networks |x Security measures |x Statistical methods | |
650 | 4 | |a Computer security |x Statistical methods | |
650 | 0 | 7 | |a Nachrichtenverkehrstheorie |0 (DE-588)4191600-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computervirus |0 (DE-588)4214774-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Monitoring |g Informatik |0 (DE-588)4522632-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Statistik |0 (DE-588)4056995-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Monitoring |g Informatik |0 (DE-588)4522632-5 |D s |
689 | 0 | 4 | |a Nachrichtenverkehrstheorie |0 (DE-588)4191600-1 |D s |
689 | 0 | 5 | |a Computervirus |0 (DE-588)4214774-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Statistik |0 (DE-588)4056995-0 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009505389&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009505389 |
Datensatz im Suchindex
_version_ | 1816444406473949184 |
---|---|
adam_text |
CONTENTS
PREFACE
V
ACKNOWLEDGMENTS
VII
INTRODUCTION
XIII
PART
I
NETWORKING
BASICS
1
TCP/IP
NETWORKING
3
1.1
OVERVIEW
OF
NETWORKING
.
3
1.2
TCPDUMP
.
6
1.3
NETWORK
LAYERING
.
9
1.4
DATA
ENCAPSULATION
.
10
1.5
HEADER
INFORMATION
.
11
1.6
FRAGMENTATION
.
21
1.7
ROUTING
.
22
1.8
DOMAIN
NAME
SERVICE
.
23
1.9
MISCELLANEOUS
UTILITIES
.
27
1.10
FURTHER
READING
.
42
2
NETWORK
STATISTICS
43
2.1
INTRODUCTION
.
43
2.2
NETWORK
TRAFFIC
INTENSITIES
.
43
X
CONTENTS
2.3
MODELING
NETWORK
TRAFFIC
.
53
2.4
MAPPING
THE
INTERNET
.
58
2.5
VISUALIZING
NETWORK
TRAFFIC
.
60
2.6
FURTHER
READING
.
70
3
EVALUATION
73
3.1
INTRODUCTION
.
73
3.2
EVALUATING
CLASSIFIERS
.
75
3.3
RECEIVER
OPERATOR
CHARACTERISTIC
CURVES
.
79
3.4
THE
DARPA/MITLL
ID
TESTBED
.
79
3.5
LIVE
NETWORK
TESTING
.
82
3.6
FURTHER
READING
.
84
PART
II
INTRUSION
DETECTION
4
NETWORK
MONITORING
89
4.1
INTRODUCTION
.
89
4.2
TCPDUMP
FILTERS
.
90
4.3
COMMON
ATTACKS
.
91
4.4
SHADOW
.
106
4.5
ACTIVITY
PROFILING
.
109
4.6
EMERALD
.
146
4.7
WATCHERS
.
150
4.8
GRIDS
.
150
4.9
MISCELLANEOUS
UTILITIES
.
151
4.10
FURTHER
READING
.
157
5
HOST
MONITORING
159
5.1
INTRODUCTION
.
159
5.2
COMMON
ATTACKS
.
159
5.3
NIDES
.
171
5.4
COMPUTER
IMMUNOLOGY
.
178
5.5
USER
PROFILING
.
183
5.6
MISCELLANEOUS
UTILITIES
.
201
5.7
FURTHER
READING
.
209
CONTENTS
XI
PART
III
VIRUSES
AND
OTHER
CREATURES
6
COMPUTER
VIRUSES
AND
WORMS
215
6.1
INTRODUCTION
.
215
6.2
HOW
VIRUSES
REPLICATE
.
216
6.3
HOW
VIRUSES
SCANNERS
WORK
.
218
6.4
EPIDEMIOLOGY
.
221
6.5
AN
IMMUNOLOGY
APPROACH
.
229
6.6
VIRUS
PHYLOGENIES
.
231
6.7
COMPUTER
WORMS
.
232
6.8
FURTHER
READING
.
239
7
TROJAN
PROGRAMS
AND
COVERT
CHANNELS
241
7.1
INTRODUCTION
.
241
7.2
COVERT
CHANNELS
.
242
7.3
STEGANOGRAPHY
.
246
7.4
BACK
DOORS
.
249
7.5
MISCELLANEOUS
TROJANS
.
252
7.6 DETECTING
TROJANS
.
254
7.7
FURTHER
READING
.
255
APPENDIX
A
WELL-KNOWN
PORT
NUMBERS
257
APPENDIX
B
TROJAN
PORT
NUMBERS
265
APPENDIX
C
COUNTRY
CODES
275
APPENDIX
D
SECURITY
WEB
SITES
281
D.L
INTRODUCTION
.
281
D.2
GENERAL
INFORMATION
WEB
SITES
.
282
D.3
SECURITY
.
284
D.4
CYBER
CRIME
.
287
D.5
SOFTWARE
.
288
D.6
DATA
.
289
D.7
INTRUSION
DETECTION
.
289
BIBLIOGRAPHY
291
GLOSSARY
311
XII
CONTENTS
ACRONYMS
AUTHOR
INDEX
SUBJECT
INDEX
317
320
325 |
any_adam_object | 1 |
author | Marchette, David J. |
author_facet | Marchette, David J. |
author_role | aut |
author_sort | Marchette, David J. |
author_variant | d j m dj djm |
building | Verbundindex |
bvnumber | BV013892251 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 273 ST 276 |
ctrlnum | (OCoLC)46809755 (DE-599)BVBBV013892251 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV013892251</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20010918</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">010905s2001 xx ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">962207586</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387952810</subfield><subfield code="9">0-387-95281-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)46809755</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013892251</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-824</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Marchette, David J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer intrusion detection and network monitoring</subfield><subfield code="b">a statistical viewpoint</subfield><subfield code="c">David J. Marchette</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 332 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Statistics for engineering and information science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Statistical methods</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Statistical methods</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Nachrichtenverkehrstheorie</subfield><subfield code="0">(DE-588)4191600-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Monitoring</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4522632-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Statistik</subfield><subfield code="0">(DE-588)4056995-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Monitoring</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4522632-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Nachrichtenverkehrstheorie</subfield><subfield code="0">(DE-588)4191600-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Statistik</subfield><subfield code="0">(DE-588)4056995-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009505389&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009505389</subfield></datafield></record></collection> |
id | DE-604.BV013892251 |
illustrated | Illustrated |
indexdate | 2024-11-22T17:26:15Z |
institution | BVB |
isbn | 0387952810 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009505389 |
oclc_num | 46809755 |
open_access_boolean | |
owner | DE-824 DE-739 DE-384 DE-522 DE-634 DE-11 |
owner_facet | DE-824 DE-739 DE-384 DE-522 DE-634 DE-11 |
physical | XVII, 332 S. Ill., graph. Darst. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Springer |
record_format | marc |
series2 | Statistics for engineering and information science |
spelling | Marchette, David J. Verfasser aut Computer intrusion detection and network monitoring a statistical viewpoint David J. Marchette New York [u.a.] Springer 2001 XVII, 332 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Statistics for engineering and information science Computer networks Monitoring Computer networks Security measures Statistical methods Computer security Statistical methods Nachrichtenverkehrstheorie (DE-588)4191600-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computervirus (DE-588)4214774-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Monitoring Informatik (DE-588)4522632-5 gnd rswk-swf Statistik (DE-588)4056995-0 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Monitoring Informatik (DE-588)4522632-5 s Nachrichtenverkehrstheorie (DE-588)4191600-1 s Computervirus (DE-588)4214774-8 s DE-604 Statistik (DE-588)4056995-0 s DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009505389&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Marchette, David J. Computer intrusion detection and network monitoring a statistical viewpoint Computer networks Monitoring Computer networks Security measures Statistical methods Computer security Statistical methods Nachrichtenverkehrstheorie (DE-588)4191600-1 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computervirus (DE-588)4214774-8 gnd Computersicherheit (DE-588)4274324-2 gnd Monitoring Informatik (DE-588)4522632-5 gnd Statistik (DE-588)4056995-0 gnd |
subject_GND | (DE-588)4191600-1 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4214774-8 (DE-588)4274324-2 (DE-588)4522632-5 (DE-588)4056995-0 |
title | Computer intrusion detection and network monitoring a statistical viewpoint |
title_auth | Computer intrusion detection and network monitoring a statistical viewpoint |
title_exact_search | Computer intrusion detection and network monitoring a statistical viewpoint |
title_full | Computer intrusion detection and network monitoring a statistical viewpoint David J. Marchette |
title_fullStr | Computer intrusion detection and network monitoring a statistical viewpoint David J. Marchette |
title_full_unstemmed | Computer intrusion detection and network monitoring a statistical viewpoint David J. Marchette |
title_short | Computer intrusion detection and network monitoring |
title_sort | computer intrusion detection and network monitoring a statistical viewpoint |
title_sub | a statistical viewpoint |
topic | Computer networks Monitoring Computer networks Security measures Statistical methods Computer security Statistical methods Nachrichtenverkehrstheorie (DE-588)4191600-1 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computervirus (DE-588)4214774-8 gnd Computersicherheit (DE-588)4274324-2 gnd Monitoring Informatik (DE-588)4522632-5 gnd Statistik (DE-588)4056995-0 gnd |
topic_facet | Computer networks Monitoring Computer networks Security measures Statistical methods Computer security Statistical methods Nachrichtenverkehrstheorie Datensicherung Rechnernetz Computervirus Computersicherheit Monitoring Informatik Statistik |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009505389&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT marchettedavidj computerintrusiondetectionandnetworkmonitoringastatisticalviewpoint |