Buy this book
Because computer security in today's networks is one of the fastest expanding areas of the computer industry, protecting resources from intruders is an arduous task that must be automated to be efficient and responsive. Most intrusion-detection systems currently rely on some type of centralized processing to analyze the data necessary to detect an intruder in real time. A centralized approach can be vulnerable to attack. If an intruder can disable the central detection system, then most, if not all, protection is subverted. The research presented here demonstrates that independent detection agents can be run in a distributed fashion, each operating mostly independent of the others, yet cooperating and communicating to provide a truly distributed detection mechanism without a single point of failure. The agents can run along with user and system software without noticeable consumption of system resources, and without generating an overwhelming amount of network traffic during an attack.
Buy this book
Previews available in: English
Showing 1 featured edition. View all 1 editions?
Edition | Availability |
---|---|
1
Autonomous agents for distributed intrusion detection in a multi-host environment
1999, Naval Postgraduate School, Available from National Technical Information Service
in English
|
aaaa
|
Book Details
Edition Notes
"September 1999"
Thesis advisor(s): Neil Rowe.
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1999.
Includes bibliographical references (p. 63-64)
Approved for public release; distribution unlimited.
Also available online.
Mode of access: World Wide Web.
System requirements: Adobe Acrobat reader.
US Marine Corps (USMC) author.
dk/dk cc:9116 02/10/00
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?February 2, 2012 | Edited by ImportBot | import new book |
February 1, 2012 | Created by ImportBot | import new book |