Apress

Managing Cyber Threats

Issues, Approaches, and Challenges

By Vipin Kumar , Jaideep Srivastava , Aleksandar Lazarevic

Managing Cyber Threats Cover Image

  • ISBN13: 978-0-3872-4226-2
  • 352 Pages
  • User Level: Science
  • Publication Date: March 30, 2006
  • Available eBook Formats: PDF
  • eBook Price: $119.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats. This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance.
Table of Contents

Table of Contents

  1. Part I. Overview. Managing Threats to Web Databases and Cyber Systems. Intrusion Detection: A Survey.
  2. Part II. Data Mining–Based Analysis of Computer Attacks. Learning Rules and Clusters for Anomaly Detection in Network Traffic. Statistical Causality Analysis of Infosec Alert Data. Making Sense of Network Security Data by Using Aggregation, Association Discovery, and Cluster Analysis.
  3. Part III. Techniques for Managing Cyber Vulnerabilities and Alerts. Early Detection of Active Internet Worms. Sensor Families for Intrusion Detection Infrastructures. Encapsulation of Owner's Intent – A New Proactive Intrusion Assessment Paradigm. Topological Analysis of Network Attack Vulnerability. Analyzing Survivable Computation in Critical Infrastructures. Alert Management Systems – A Quick Introduction.
  4. Part IV. Cyber Forensics. Cyber Forensics – Managing, Modeling, and Mining Cyber Data for Investigation. Cyber Forensics – An Introduction.
Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published