eBook Intrusion Detection Networks: A Key to Collaborative Security, 1st Edition

  • Carol Fung
  • Published By: Auerbach Publications
  • ISBN-10: 146656413X
  • ISBN-13: 9781466564138
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 262 Pages | eBook
  • Original Copyright 2013 | Published/Released February 2016
  • This publication's content originally published in print form: 2013
  • Price:  Sign in for price



The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations.

The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context.The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
List of Figures.
List of Tables.
About the Authors.
Cyber Intrusions and Intrusion Detection.
1: Cyber Intrusions.
2: Intrusion Detection.
Design of an Intrusion Detection Network.
3: Collaborative Intrusion Detection Networks Architecture Design.
4: Trust Management.
5: Collaborative Decision.
6: Resource Management.
7: Collaborators Selection and Management.
Other Types of IDN Design.
8: Knowledge-Based Intrusion Detection Networks and Knowledge Propagation.
9: Collaborative Malware Detection Networks.
10: Conclusion.
Examples of Intrusion Detection Rules and Alerts.
Proofs of Theorems.