Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environ...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2004
|
Ausgabe: | 1st ed. 2004 |
Schriftenreihe: | Advances in Information Security
9 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation |
Beschreibung: | 1 Online-Ressource (XIX, 136 p) |
ISBN: | 9781461504672 |
DOI: | 10.1007/978-1-4615-0467-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064298 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2004 |||| o||u| ||||||eng d | ||
020 | |a 9781461504672 |9 978-1-4615-0467-2 | ||
024 | 7 | |a 10.1007/978-1-4615-0467-2 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4615-0467-2 | ||
035 | |a (OCoLC)1227484156 | ||
035 | |a (DE-599)BVBBV047064298 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.73 |2 23 | |
100 | 0 | |a Peng Ning |e Verfasser |4 aut | |
245 | 1 | 0 | |a Intrusion Detection in Distributed Systems |b An Abstraction-Based Approach |c by Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang |
250 | |a 1st ed. 2004 | ||
264 | 1 | |a New York, NY |b Springer US |c 2004 | |
300 | |a 1 Online-Ressource (XIX, 136 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Information Security |v 9 | |
520 | |a Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation | ||
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Input/Output and Data Communications | |
650 | 4 | |a Data Structures | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer organization | |
650 | 4 | |a Input-output equipment (Computers) | |
700 | 1 | |a Jajodia, Sushil |4 aut | |
700 | 1 | |a Wang, Xiaoyang Sean |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461350910 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402076244 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461504689 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4615-0467-2 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471410 | ||
966 | e | |u https://doi.org/10.1007/978-1-4615-0467-2 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062139179008 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Peng Ning Jajodia, Sushil Wang, Xiaoyang Sean |
author_facet | Peng Ning Jajodia, Sushil Wang, Xiaoyang Sean |
author_role | aut aut aut |
author_sort | Peng Ning |
author_variant | p n pn s j sj x s w xs xsw |
building | Verbundindex |
bvnumber | BV047064298 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4615-0467-2 (OCoLC)1227484156 (DE-599)BVBBV047064298 |
dewey-full | 005.73 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.73 |
dewey-search | 005.73 |
dewey-sort | 15.73 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4615-0467-2 |
edition | 1st ed. 2004 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02673nmm a2200565zcb4500</leader><controlfield tag="001">BV047064298</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461504672</subfield><subfield code="9">978-1-4615-0467-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-0467-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4615-0467-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227484156</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064298</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.73</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Peng Ning</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intrusion Detection in Distributed Systems</subfield><subfield code="b">An Abstraction-Based Approach</subfield><subfield code="c">by Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2004</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 136 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">9</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Input/Output and Data Communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Input-output equipment (Computers)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Xiaoyang Sean</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461350910</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402076244</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461504689</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-0467-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471410</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-0467-2</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064298 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9781461504672 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471410 |
oclc_num | 1227484156 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XIX, 136 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer US |
record_format | marc |
series2 | Advances in Information Security |
spelling | Peng Ning Verfasser aut Intrusion Detection in Distributed Systems An Abstraction-Based Approach by Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang 1st ed. 2004 New York, NY Springer US 2004 1 Online-Ressource (XIX, 136 p) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 9 Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation Data Structures and Information Theory Cryptology Computer Communication Networks Computer Systems Organization and Communication Networks Input/Output and Data Communications Data Structures Data structures (Computer science) Data encryption (Computer science) Computer communication systems Computer organization Input-output equipment (Computers) Jajodia, Sushil aut Wang, Xiaoyang Sean aut Erscheint auch als Druck-Ausgabe 9781461350910 Erscheint auch als Druck-Ausgabe 9781402076244 Erscheint auch als Druck-Ausgabe 9781461504689 https://doi.org/10.1007/978-1-4615-0467-2 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Peng Ning Jajodia, Sushil Wang, Xiaoyang Sean Intrusion Detection in Distributed Systems An Abstraction-Based Approach Data Structures and Information Theory Cryptology Computer Communication Networks Computer Systems Organization and Communication Networks Input/Output and Data Communications Data Structures Data structures (Computer science) Data encryption (Computer science) Computer communication systems Computer organization Input-output equipment (Computers) |
title | Intrusion Detection in Distributed Systems An Abstraction-Based Approach |
title_auth | Intrusion Detection in Distributed Systems An Abstraction-Based Approach |
title_exact_search | Intrusion Detection in Distributed Systems An Abstraction-Based Approach |
title_exact_search_txtP | Intrusion Detection in Distributed Systems An Abstraction-Based Approach |
title_full | Intrusion Detection in Distributed Systems An Abstraction-Based Approach by Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang |
title_fullStr | Intrusion Detection in Distributed Systems An Abstraction-Based Approach by Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang |
title_full_unstemmed | Intrusion Detection in Distributed Systems An Abstraction-Based Approach by Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang |
title_short | Intrusion Detection in Distributed Systems |
title_sort | intrusion detection in distributed systems an abstraction based approach |
title_sub | An Abstraction-Based Approach |
topic | Data Structures and Information Theory Cryptology Computer Communication Networks Computer Systems Organization and Communication Networks Input/Output and Data Communications Data Structures Data structures (Computer science) Data encryption (Computer science) Computer communication systems Computer organization Input-output equipment (Computers) |
topic_facet | Data Structures and Information Theory Cryptology Computer Communication Networks Computer Systems Organization and Communication Networks Input/Output and Data Communications Data Structures Data structures (Computer science) Data encryption (Computer science) Computer communication systems Computer organization Input-output equipment (Computers) |
url | https://doi.org/10.1007/978-1-4615-0467-2 |
work_keys_str_mv | AT pengning intrusiondetectionindistributedsystemsanabstractionbasedapproach AT jajodiasushil intrusiondetectionindistributedsystemsanabstractionbasedapproach AT wangxiaoyangsean intrusiondetectionindistributedsystemsanabstractionbasedapproach |