Understanding Intrusion Detection Through Visualization
Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key shortfall in current intrusion detection systems is the high number of false alarms they produce. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection. Four different visualization approaches are presented, mainly applied to data from web server access logs.
- Condition: --
HPB condition ratings
- New: Item is brand new, unused and unmarked, in flawless condition.
- Fine/Like New (F): No defects, little usage. May show remainder marks. Older books may show minor flaws.
- Very Good (VG): Shows some signs of wear and is no longer fresh. Attractive. Used textbooks do not come with supplemental materials.
- Good (G): Average used book with all pages present. Possible loose bindings, highlighting, cocked spine or torn dust jackets. Used textbooks do not come with supplemental materials.
- Fair (FR): Obviously well-worn, but no text pages missing. May be without endpapers or title page. Markings do not interfere with readability. Used textbooks do not come with supplemental materials.
- Poor (P): All text is legible but may be soiled and have binding defects. Reading copies and binding copies fall into this category. Used textbooks do not come with supplemental materials.
- Format: Hardcover
- Sold by: --
- Language: English
- Publisher: Springer-Verlag New York Inc
- ISBN-13: 9780387276342
- ISBN: 0387276343
- Publication Year: 2005