We a good story
Quick delivery in the UK

Fault ¿ Tolerant Anomaly Detection System

About Fault ¿ Tolerant Anomaly Detection System

Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the network. An Intrusion Detection System (IDS) is either software or hardware or both that attempts to perform intrusion detection and raise alarm when a possible intrusion happens. Since the 1950s enough researches on IDS have been done for the UNIX environment. Building IDS for Windows is at its infant stage. In the latter, the authenticity of a user using client applications can be governed by administrators. But abnormal usage of applications cannot be detected. The architectures commonly employed by commercial and experimental IDSs have a number of problems that limit their configurability, scalability, and efficiency. This book aims at detecting anomalous usage of legitimate applications by authorized users in the Windows environment, and to implement a fault¿tolerant architecture which continues providing detection services even in case of failure of one or more detecting servers.

Show more
  • Language:
  • English
  • ISBN:
  • 9786203581454
  • Binding:
  • Paperback
  • Pages:
  • 60
  • Published:
  • March 31, 2021
  • Dimensions:
  • 150x4x220 mm.
  • Weight:
  • 107 g.
Delivery: 1-2 weeks
Expected delivery: October 19, 2024

Description of Fault ¿ Tolerant Anomaly Detection System

Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the network. An Intrusion Detection System (IDS) is either software or hardware or both that attempts to perform intrusion detection and raise alarm when a possible intrusion happens. Since the 1950s enough researches on IDS have been done for the UNIX environment. Building IDS for Windows is at its infant stage. In the latter, the authenticity of a user using client applications can be governed by administrators. But abnormal usage of applications cannot be detected. The architectures commonly employed by commercial and experimental IDSs have a number of problems that limit their configurability, scalability, and efficiency. This book aims at detecting anomalous usage of legitimate applications by authorized users in the Windows environment, and to implement a fault¿tolerant architecture which continues providing detection services even in case of failure of one or more detecting servers.

User ratings of Fault ¿ Tolerant Anomaly Detection System



Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.