HOME > 상세정보

상세정보

Computer intrusion detection and network monitoring : a statistical viewpoint

Computer intrusion detection and network monitoring : a statistical viewpoint (5회 대출)

자료유형
단행본
개인저자
Marchette, David J.
서명 / 저자사항
Computer intrusion detection and network monitoring : a statistical viewpoint / David J. Marchette.
발행사항
New York :   Springer ,   c2001.  
형태사항
xvii, 332 p. : ill. ; 24 cm.
총서사항
Statistics for engineering and information science
ISBN
0387952810 (alk. paper)
서지주기
Includes bibliographical references (p. 291-310) and indexes.
일반주제명
Computer security -- Statistical methods. Computer networks -- Security measures -- Statistical methods. Computer networks -- Monitoring.
000 01056camuu22002894a 4500
001 000045315897
005 20061220094422
008 010417s2001 nyua b 001 0 eng
010 ▼a 2001032011
020 ▼a 0387952810 (alk. paper)
035 ▼a (KERIS)REF000012647849
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b M34 2001
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b M317c
100 1 ▼a Marchette, David J.
245 1 0 ▼a Computer intrusion detection and network monitoring : ▼b a statistical viewpoint / ▼c David J. Marchette.
260 ▼a New York : ▼b Springer , ▼c c2001.
300 ▼a xvii, 332 p. : ▼b ill. ; ▼c 24 cm.
440 0 ▼a Statistics for engineering and information science
504 ▼a Includes bibliographical references (p. 291-310) and indexes.
650 0 ▼a Computer security ▼x Statistical methods.
650 0 ▼a Computer networks ▼x Security measures ▼x Statistical methods.
650 0 ▼a Computer networks ▼x Monitoring.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 M317c 등록번호 121136205 (5회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.

In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection.


정보제공 : Aladin

목차

Part I: Networking Basics: TCP/IP * Network Statistics * Evaluation * Part II: Intrusion Detection: Network Monitoring * Host Monitoring * Part III: Viruses and Other Creatures: Computer Viruses and Worms * Trojan Programs and Covert Channels * Appendices: Well Known Port Numbers * Trojan Port Numbers * Country Codes * Security Web Sites


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)