ebook img

Privacy-respecting intrusion detection PDF

303 Pages·2007·3.595 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Privacy-respecting intrusion detection

Description:
With our society's growing dependency on information technology systems (IT), the issue of IT Security becomes increasingly important. IT security cannot be achieved by means of preventive safeguards alone. To properly respond to misuse or abusive activity in IT systems, one needs to establish the capability to detect and understand improper activity.  Intrusion Detection Systems (IDSs) observe activity occurring in the IT system, record these observations in audit data, and analyze the collected audit data in order to detect misuse. The collection and processing of audit data for misuse detection conflicts with the expectation and the rights of the system users regarding their privacy. A viable solution is replacing personal data with pseudonyms in audit data. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data, to the amount necessary for misuse detection. Also, it limits the recovery of the original personal data to pseudonyms involved in a detected misuse scenario. This book includes case studies demonstrating this theory and solutions that are constructively validated by providing algorithms. Privacy-Respecting Intrusion Detection is designed for a professional audience, composed of practitioners and researchers in industry. This book is also suitable as an advance-level text in the computer science field. Foreword by Richard Kemmerer, University of California, Santa Barbara, USA.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.