Low Price Guarantee
We Take School POs
Privacy-Respecting Intrusion Detection 2007 Edition
Contributor(s): Flegel, Ulrich (Author)

View larger image

ISBN: 0387343466     ISBN-13: 9780387343464
Publisher: Springer
OUR PRICE: $104.49  

Binding Type: Hardcover - See All Available Formats & Editions
Published: October 2007
Qty:

Annotation: With our society's growing dependency on information technology systems (IT), the issue of IT Security becomes increasingly important. IT security cannot be achieved by means of preventive safeguards alone. To properly respond to misuse or abusive activity in IT systems, one needs to establish the capability to detect and understand improper activity. Intrusion Detection Systems (IDSs) observe activity occurring in the IT system, record these observations in audit data, and analyze the collected audit data in order to detect misuse.

The collection and processing of audit data for misuse detection conflicts with the expectation and the rights of the system users regarding their privacy. A viable solution is replacing personal data with pseudonyms in audit data.

Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data, to the amount necessary for misuse detection. Also, it limits the recovery of the original personal data to pseudonyms involved in a detected misuse scenario. This book includes case studies demonstrating this theory and solutions that are constructively validated by providing algorithms.

Privacy-Respecting Intrusion Detection is designed for a professional audience, composed of practitioners and researchers in industry. This book is also suitable as an advance-level text in the computer science field.

Foreword by Richard Kemmerer, University of California, Santa Barbara, USA.



Click for more in this series: Advances in Information Security

Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Networking - Hardware
- Computers | Information Technology
Dewey: 005.8
Series: Advances in Information Security
Physical Information: 0.9" H x 6.39" W x 9.27" L (2.48 lbs) 307 pages
Features: Bibliography, Illustrated, Index, Table of Contents
 
Descriptions, Reviews, Etc.
Publisher Description:
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties in evaluating a system to determine if it provided the necessary security for particular applications. The Anderson Report, published in 1972, was the outcome of an Air Force Planning Study whose intent was to de?ne the research and development paths required to make secure computers a reality in the USAF. A major contribution of this report was the de?nition of the reference monitor concept, which led to security kernel architectures. In the mid to late 1970s a number of systems were designed and implemented using a security kernel architecture. These systems were mostly sponsored by the defense establishment and were not in wide use. Fast forwarding to more recent times, the advent of the world-wide web, inexp- sive workstations for the o?ce and home, and high-speed connections has made it possible for most people to be connected. This access has greatly bene?ted society allowing users to do their banking, shopping, and research on the Int- net. Most every business, government agency, and public institution has a public facing web page that can be accessed by anyone anywhere on the Internet. - fortunately, society's increased dependency on networked software systems has also given easy access to the attackers, and the number of attacks is steadily increasing.
 
Customer ReviewsSubmit your own review
 
To tell a friend about this book, you must Sign In First!