Understanding intrusion detection through visualization /

Saved in:
Bibliographic Details
Author / Creator:Axelsson, Stefan, 1968-
Imprint:New York : Springer, c2006.
Description:1 online resource (xx, 145 p.) : ill.
Language:English
Series:Advances in information security ; v. 24
Advances in information security ; v. 24.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/8877725
Hidden Bibliographic Details
Other authors / contributors:Sands, David, 1965-
ISBN:9780387276366
038727636X
9786610609314
6610609314
0387276343 (Cloth)
9780387276342 (Cloth)
Notes:Includes bibliographical references (p. [133]-140) and index.
Includes bibliographical references and index.
Description based on print version record.
Other form:Print version: Axelsson, Stefan, 1968- Understanding intrusion detection through visualization. New York : Springer, c2006 0387276343 9780387276342
Description
Summary:This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Göteborg, Sweden. The dissertation, in turn collects a number of research efforts performed over a period of six years or so into a coherent whole. It was my honor to serve as the "opponent" at Dr. Axelsson's examination. In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating its significance and contributions to the field and then to introduce the work to the attendees at the examination. This done, the candidate presents the technical details of the work and the opponent critiques the work giving the candidate the opportunity to defend it^. This forward is adapted from the introduction that I gave at the examination and should serve to acquaint the reader, not only with the work at hand, but also with the field to which it applies. The title of the work, "Under­ standing Intrusion Detection Through Visualization," is particularly telling. As is the case with any good piece of research, we hope to gain an understanding of a problem, not just a recipe or simple solution of immediate, but limited utility. For much of its formative period, computer security concentrated on devel­ oping systems that, in effect, embodied a fortress model of protection.
Physical Description:1 online resource (xx, 145 p.) : ill.
Bibliography:Includes bibliographical references (p. [133]-140) and index.
Includes bibliographical references and index.
ISBN:9780387276366
038727636X
9786610609314
6610609314
0387276343
9780387276342