menu
{ "item_title" : "Searching System Call Information for Clues", "item_author" : [" Mark Gerald Reith "], "item_description" : "The United States Air Force extensively uses information systems as a tool for managing and maintaining its information. The increased dependence on these systems in recent years has necessitated the need for protection from threats of information warfare and cyber terrorism. One type of protection utilizes intrusion detection systems to provide indications that intrusive behavior has occurred. Other types of protection may include packet filtering, cryptography and strong user authentication. Traditional approaches toward intrusion detection rely on features that are external to computer processes. By treating processes as black-boxes, intrusion detection systems may miss a wealth of information that could be useful for detecting intrusions. This thesis effort investigates the effectiveness of anomaly-based intrusion detection using system call information from a computational process. Previous work uses sequences of system calls to identify anomalies in processes.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/1/28/839/877/1288398778_b.jpg", "price_data" : { "retail_price" : "17.95", "online_price" : "17.95", "our_price" : "17.95", "club_price" : "17.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Searching System Call Information for Clues|Mark Gerald Reith

Searching System Call Information for Clues : The Effects of Intrusions on Processes

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

The United States Air Force extensively uses information systems as a tool for managing and maintaining its information. The increased dependence on these systems in recent years has necessitated the need for protection from threats of information warfare and cyber terrorism. One type of protection utilizes intrusion detection systems to provide indications that intrusive behavior has occurred. Other types of protection may include packet filtering, cryptography and strong user authentication. Traditional approaches toward intrusion detection rely on features that are external to computer processes. By treating processes as black-boxes, intrusion detection systems may miss a wealth of information that could be useful for detecting intrusions. This thesis effort investigates the effectiveness of anomaly-based intrusion detection using system call information from a computational process. Previous work uses sequences of system calls to identify anomalies in processes.

This item is Non-Returnable

Details

  • ISBN-13: 9781288398775
  • ISBN-10: 1288398778
  • Publisher: Biblioscholar
  • Publish Date: December 2012
  • Dimensions: 9.21 x 6.14 x 0.24 inches
  • Shipping Weight: 0.38 pounds
  • Page Count: 114

Related Categories

You May Also Like...

    1

BAM Customer Reviews