ABSTRACT

The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy.Intrusion Detect

chapter |6 pages

SECTION I: INTRODUCTION

part |2 pages

SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION

chapter 2|12 pages

Cyber Intrusions

chapter 3|18 pages

Intrusion Detection

part |2 pages

SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK

chapter 5|22 pages

Trust Management

chapter 6|24 pages

Collaborative Decision

chapter 7|22 pages

Resource Management

chapter 8|26 pages

Collaborators Selection and Management

part |2 pages

SECTION IV: OTHER TYPES OF IDN DESIGN