Port Scans and Ping Sweeps Explained
Linux Journal
Abstraction-based intrusion detection in distributed environments
ACM Transactions on Information and System Security (TISSEC)
Journal of Network and Systems Management
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
Practical automated detection of stealthy portscans
Journal of Computer Security
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Network Security Modeling and Cyber Attack Simulation Methodology
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Simulation of Network Security with Collaboration among IDS Models
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Authorization Based on Evidence and Trust
DaWaK 2000 Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery
Laboratory exercises for a computer security course
Journal of Computing Sciences in Colleges
Markov Chains, Classifiers, and Intrusion Detection
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Aspects of adaptive reconfiguration in a scalable intrusion tolerant system
Complexity - Special issue: Resilient and adaptive defense of computing networks
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Security analysis of SITAR intrusion tolerance system
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Design and implement of firewall-log-based online attack detection system
InfoSecu '04 Proceedings of the 3rd international conference on Information security
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
A System Architecture for Computer Intrusion Detection
Information-Knowledge-Systems Management
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
On the Limits of Payload-Oblivious Network Attack Detection
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Journal of Digital Forensic Practice
Performance adaptation in real-time intrusion detection systems
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Modeling and simulation of distributed security models
ICCS'03 Proceedings of the 2003 international conference on Computational science
Cost-effective IDS operating scheme in MANETs
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Using unsupervised learning for network alert correlation
Canadian AI'08 Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence
Modeling of distributed intrusion detection using fuzzy system
ICIC'06 Proceedings of the 2006 international conference on Intelligent computing: Part II
Isolation solution for insecure information systems
DNCOCO'10 Proceedings of the 9th WSEAS international conference on Data networks, communications, computers
Using self-organizing networks for intrusion detection
NN'05 Proceedings of the 6th WSEAS international conference on Neural networks
Application of fuzzy logic for distributed intrusion detection
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An effective placement of detection systems for distributed attack detection in large scale networks
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Efficient deployment of honeynets for statistical and forensic analysis of attacks from the internet
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Secure communication using identity based encryption
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
From the Publisher:Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures.