|
|
|||
|
||||
OverviewAs the advances in networking technology help to connect any part of the globe, and openness and scalability of the Internet is opening up a number of new on-line applications, the threats from attackers has also grown drastically. In recent years, attackers have shown increasing sophistication in their ability to launch attacks which threaten the security of the devices connected to the Internet. Accordingly, this volume discusses the design of effective Intrusion Detection Systems (IDS), clustering techniques in designing anomaly based IDS, network traffic analysis for security analysis, special properties of Elliptic curves in the context of designing security tools, use of a spatio-temporal logic for checking anomalies in filtering rules as model checking in PSPACE, automated intrusion signatures generation technique, use of sensor fusion in IDS, mechanisms for SPIT prevention, detection mechanism for SQL injection attacks, prevention of unknown malware attack, vulnerabilities in web browsers, security issues in ICMP, reputation systems for online community, copyright protection of digital image, multimedia encryption techniques, attacks and countermeasures in WSNs, WMNs, and P2P networks, key agreement and authentication protocols in UMTS. Full Product DetailsAuthor: Nityananda Sarma , Dhruba K. BhattacharyyaPublisher: Narosa Publishing House Imprint: Narosa Publishing House Dimensions: Width: 18.50cm , Height: 1.50cm , Length: 24.00cm Weight: 0.560kg ISBN: 9788184870886ISBN 10: 8184870884 Pages: 182 Publication Date: 30 January 2010 Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Hardback Publisher's Status: Inactive Availability: In Print Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsForeword Preface Acknowledgement Supersingularity and Cyclicity of Elliptic Curves High-Speed Network Traffic Analysis: Challenges and Approaches SSL Automated Signatures Carving Rule-based Filters within a Spatio-temporal Logic Unsupervised Anomaly Detection using Incremental Subspace Clustering Security Attacks and Countermeasures in Wireless Sensor Networks Detection of Wormhole Attacks in Wireless Mesh Networks Modified UMTS Authentication and Key Agreement Protocol for Enhanced User Identity Confidentiality Use of Sensor Fusion in Intrusion Detection System: A Survey An Effective Detection Mechanism of SQL Injection Attack Security Issues in ICMPv4 Vulnerabilities in Web Browsers SPIT Preventions: A Study on the Existing Solutions Anomaly based Intrusion Detection using Incremental Approach: A Survey Robust Invisible Adaptive-watermark Scheme for Copyright Protection of Digital Images Issues of Fairness in Reputation Systems for Online Community: A Survey A Survey on Security Measures used in Peer-to-Peer System A Review on Applications of Multimedia Encryption Preventing Unknown Malware Attack by using Intelligence Intrusion Multi Detection Prevention System Author Index Committees.ReviewsAuthor InformationN. Sarma / D. K. Bhattacharyya.: Department of Computer Science and Engineering Tezpur University, Tezpur Tab Content 6Author Website:Countries AvailableAll regions |