The State of the Art in Intrusion Prevention and Detection: 1st Edition (Paperback) book cover

The State of the Art in Intrusion Prevention and Detection

1st Edition

Edited by Al-Sakib Khan Pathan

Auerbach Publications

514 pages | 168 B/W Illus.

Purchasing Options:$ = USD
Paperback: 9781138033986
pub: 2016-11-16
SAVE ~$12.99
$64.95
$51.96
x
Hardback: 9781482203516
pub: 2014-01-29
SAVE ~$33.00
$165.00
$132.00
x
eBook (VitalSource) : 9780429090578
pub: 2014-01-29
from $31.48


FREE Standard Shipping!

Description

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.

Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective.

The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection.

The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. Containing some chapters written in a tutorial style, this book is an ideal reference for graduate students, professionals, and researchers working in the field of computer and network security.

Table of Contents

NETWORK TRAFFIC ANALYSIS AND MANAGEMENT FOR IDS

Outlier Detection; Mohiuddin Ahmed, Abdun Naser Mahmood, and Jiankun Hu

Network Traffic Monitoring and Analysis; Jeferson Wilian de Godoy Stenico and Lee Luan Ling

Using Routers and Honeypots in Combination for Collecting Internet Worm Attacks; Mohssen Mohammed and Al-Sakib Khan Pathan

Attack Severity–Based Honeynet Management Framework; Asit More and Shashikala Tapaswi

IDS ISSUES FOR DIFFERENT INFRASTRUCTURES

Intrusion Detection Systems for Critical Infrastructure; Bernardi Pranggono, Kieran McLaughlin, Yi Yang, and Sakir Sezer

Cyber Security of Smart Grid Infrastructure; Adnan Anwar and Abdun Naser Mahmood

Intrusion Detection and Prevention in Cyber Physical Systems; Mohamed Azab and Mohamed Eltoweissy

Encrypted Ranked Proximity and Phrase Searching in the Cloud; Steven Zittrower and Cliff C. Zou

Intrusion Detection for SCADA Systems; Alaa Atassi, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi

Hardware Techniques for High-Performance Network Intrusion Detection; Weirong Jiang and Viktor K. Prasanna

ARTIFICIAL INTELLIGENCE TECHNIQUES FOR IDS

New Unknown Attack Detection with the Neural Network–Based IDS; Przemysław Kukiełka and Zbigniew Kotulski

Artificial Intelligence-Based Intrusion Detection Techniques; Zahra Jadidi, Vallipuram Muthukkumarasamy, and Elankayer Sithirasenan

Applications of Machine Learning in Intrusion Detection; Yuxin Meng, Yang Xiang, and Lam-For Kwok

IDS FOR WIRELESS SYSTEMS

Introduction to Wireless Intrusion Detection Systems; Jonny Milliken

Cross Layer–Based Intrusion Detection Techniques in Wireless Networks: A Survey; Subir Halder and Amrita Ghosal

Intrusion Detection System Architecture for Wireless Sensor Network; Mohammad Saiful Islam Mamun

Unique Challenges in WiFi Intrusion Detection; Jonny Milliken

Intrusion Detection Systems for (Wireless) Automation Systems; Jana Krimmling and Peter Langendoerfer

An Innovative Approach of Blending Security Features in Energy-Efficient Routing for a Crowded Network of Wireless Sensors; Al-Sakib Khan Pathan and Tarem Ahmed

About the Editor

Al-Sakib Khan Pathan received a PhD degree in computer engineering in 2009 from Kyung Hee University, South Korea. He received a BSc degree in computer science and information technology from Islamic University of Technology (IUT), Bangladesh, in 2003. He is currently an assistant professor in the computer science department at International Islamic University Malaysia (IIUM), Malaysia. Until June 2010, he served as an assistant professor in the computer science and engineering department in BRAC University, Bangladesh. Prior to holding this position, he worked as a researcher at Networking Lab, Kyung Hee University, South Korea, till August 2009. His research interests include wireless sensor networks, network security, and e-services technologies. He is a recipient of several awards/best paper awards and has several publications in these areas.

He has served as a chair, organizing committee member, and technical program committee member in numerous international conferences or workshops such as GreenCom, HPCS, ICA3PP, IWCMC, VTC, HPCC, IDCS, etc. He is currently serving as the editor-in-chief of IJIDS, an area editor of IJCNIS, editor of IJCSE, Inderscience, associate editor of IASTED/ACTA Press IJCA and CCS, guest editor of some special issues of top-ranked journals, and editor/author of nine books. He also serves as a referee of some renowned journals. He is a member of Institute of Electrical and Electronics Engineers (IEEE), USA; IEEE Communications Society, USA; IEEE ComSoc Bangladesh Chapter, and several other international professional organizations.

Subject Categories

BISAC Subject Codes/Headings:
COM043000
COMPUTERS / Networking / General
COM053000
COMPUTERS / Security / General