Skip to main content
Taylor & Francis Group Logo
    Advanced Search

    Click here to search products using title name,author name and keywords.

    • Login
    • Hi, User  
      • Your Account
      • Logout
      Advanced Search

      Click here to search products using title name,author name and keywords.

      Breadcrumbs Section. Click here to navigate to respective pages.

      Book

      Intrusion Detection Networks
      loading

      Book

      Intrusion Detection Networks

      DOI link for Intrusion Detection Networks

      Intrusion Detection Networks book

      A Key to Collaborative Security

      Intrusion Detection Networks

      DOI link for Intrusion Detection Networks

      Intrusion Detection Networks book

      A Key to Collaborative Security
      ByCarol Fung, Raouf Boutaba
      Edition 1st Edition
      First Published 2013
      eBook Published 13 November 2013
      Pub. Location New York
      Imprint Auerbach Publications
      DOI https://doi.org/10.1201/b16048
      Pages 261
      eBook ISBN 9780429099922
      Subjects Computer Science
      Share
      Share

      Get Citation

      Fung, C., & Boutaba, R. (2013). Intrusion Detection Networks: A Key to Collaborative Security (1st ed.). Auerbach Publications. https://doi.org/10.1201/b16048

      ABSTRACT

      The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy.Intrusion Detect

      TABLE OF CONTENTS

      chapter |6 pages

      SECTION I: INTRODUCTION

      part |2 pages

      SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION

      chapter 2|12 pages

      Cyber Intrusions

      chapter 3|18 pages

      Intrusion Detection

      part |2 pages

      SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK

      chapter 4|10 pages

      Collaborative Intrusion Detection Networks Architecture Design

      chapter 5|22 pages

      Trust Management

      chapter 6|24 pages

      Collaborative Decision

      chapter 7|22 pages

      Resource Management

      chapter 8|26 pages

      Collaborators Selection and Management

      part |2 pages

      SECTION IV: OTHER TYPES OF IDN DESIGN

      chapter 9|34 pages

      Knowledge-Based Intrusion Detection Networks and Knowledge Prop- agation

      chapter 10|28 pages

      Collaborative Malware Detection Networks

      T&F logoTaylor & Francis Group logo
      • Policies
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
      • Journals
        • Taylor & Francis Online
        • CogentOA
        • Taylor & Francis Online
        • CogentOA
      • Corporate
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
      • Help & Contact
        • Students/Researchers
        • Librarians/Institutions
        • Students/Researchers
        • Librarians/Institutions
      • Connect with us

      Connect with us

      Registered in England & Wales No. 3099067
      5 Howick Place | London | SW1P 1WG © 2022 Informa UK Limited