La fonction de gestion du réseau comprend la surveillance des activités de tous les périphériques réseau et des activités de l'utilisateur. Il enregistre également l'activité anormale ou malveillante de l'utilisateur appelée intrusions. Normalement, l'administrateur détecte des problèmes ou des intrusions réseau en analysant les informations contenues dans le fichier journal à intervalles réguliers. Il est proposé d'utiliser la signalisation sonore d'événements malveillants. Ainsi, une auralisation appropriée de tous les modules d'une application de gestion réseau permettrait à un administrateur réseau de prendre les mesures correctives nécessaires. Le but de cette recherche est d'étudier l'utilité de l'auralisation dans la détection d'intrusion. Le travail se concentre sur l'auralisation d'un système de détection d'intrusion et une détermination expérimentale de l'efficacité de l'auralisation effectuée. L'auralisation permettrait à l'administrateur de détecter certaines attaques telles que le déni de service, ce qui aiderait à fournir un meilleur service aux utilisateurs légitimes en contrecarrant immédiatement les intrusions. Le travail tente de trouver l'efficacité de l'auralisation dans la détection précoce des faux positifs ainsi que dans la surveillance des intrus et des hôtes vulnérables en temps opportun.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The network management function includes monitoring the activities of all network devices and the activities of the user. It also logs the anomalous or malicious activity of the user called intrusions. Normally the administrator would detect network problems or intrusions by analyzing the information in the log file at regular intervals of time. It is proposed to use aural signaling of malicious events. Thus a suitable auralization of all the modules in a network management application would allow a network administrator to take the necessary corrective actions. The goal of this research is to investigate usefulness of auralization in intrusion detection. The work focuses on the auralization of an intrusion detection system and an experimental determination of the effectiveness of the auralization performed. The auralization would allow the administrator to detect some attacks like Denial of service, which would assist in providing better service to the legitimate users by thwarting the intrusions immediately. The work attempts to find the effectiveness of auralization in early detection of false positives as well as in monitoring intruders and vulnerable hosts in a timely manner. 284 pp. Englisch. N° de réf. du vendeur 9783639762235
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Rashid Syed ZahidurHis research interests are in the areas of computer network security, machine learning, data mining, information acquisition, and decision theory. Specifically, in active learning, active inference, statistical rel. N° de réf. du vendeur 151400882
Quantité disponible : Plus de 20 disponibles
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. Computer Network Security Monitoring | The State of the Art in Intrusion Prevention and Detection | Syed Zahidur Rashid | Taschenbuch | Englisch | 2015 | Scholars' Press | EAN 9783639762235 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu Print on Demand. N° de réf. du vendeur 113176211
Quantité disponible : 5 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -The network management function includes monitoring the activities of all network devices and the activities of the user. It also logs the anomalous or malicious activity of the user called intrusions. Normally the administrator would detect network problems or intrusions by analyzing the information in the log file at regular intervals of time. It is proposed to use aural signaling of malicious events. Thus a suitable auralization of all the modules in a network management application would allow a network administrator to take the necessary corrective actions. The goal of this research is to investigate usefulness of auralization in intrusion detection. The work focuses on the auralization of an intrusion detection system and an experimental determination of the effectiveness of the auralization performed. The auralization would allow the administrator to detect some attacks like Denial of service, which would assist in providing better service to the legitimate users by thwarting the intrusions immediately. The work attempts to find the effectiveness of auralization in early detection of false positives as well as in monitoring intruders and vulnerable hosts in a timely manner.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 284 pp. Englisch. N° de réf. du vendeur 9783639762235
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The network management function includes monitoring the activities of all network devices and the activities of the user. It also logs the anomalous or malicious activity of the user called intrusions. Normally the administrator would detect network problems or intrusions by analyzing the information in the log file at regular intervals of time. It is proposed to use aural signaling of malicious events. Thus a suitable auralization of all the modules in a network management application would allow a network administrator to take the necessary corrective actions. The goal of this research is to investigate usefulness of auralization in intrusion detection. The work focuses on the auralization of an intrusion detection system and an experimental determination of the effectiveness of the auralization performed. The auralization would allow the administrator to detect some attacks like Denial of service, which would assist in providing better service to the legitimate users by thwarting the intrusions immediately. The work attempts to find the effectiveness of auralization in early detection of false positives as well as in monitoring intruders and vulnerable hosts in a timely manner. N° de réf. du vendeur 9783639762235
Quantité disponible : 1 disponible(s)
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
paperback. Etat : Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book. N° de réf. du vendeur ERICA82336397622316
Quantité disponible : 1 disponible(s)