
The State of the Art in Intrusion Prevention and Detection
[BOOK DESCRIPTION]
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective. The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection. The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. Containing some chapters written in a tutorial style, this book is an ideal reference for graduate students, professionals, and researchers working in the field of computer and network security.
[TABLE OF CONTENTS]
Preface ix
Acknowledgments xi
Editor xiii
Contributors xv
SECTION I Network Traffic Analysis and
Management for IDS
Chapter 1 Outlier Detection 3 (20)
Mohiuddin Ahmed
Abdun Naser Mahmood
Jiankun Hu
Chapter 2 Network Traffic Monitoring and 23 (24)
Analysis
Jeferson Wilian de Godoy Stenico
Lee Luan Ling
Chapter 3 Using Routers and Honeypots in 47 (38)
Combination for Collecting Internet Worm
Attacks
Mohssen Mohammed
Al-Sakib Khan Pathan
Chapter 4 Attack Severity--Based Honeynet 85 (30)
Management Framework
Asit More
Shashikala Tapaswi
SECTION II IDS Issues for Different
Infrastructures
Chapter 5 Intrusion Detection Systems for 115 (24)
Critical Infrastructure
Bernardi Pranggono
Kieran McLaughlin
Yi Yang
Sakir Sezer
Chapter 6 Cyber Security of Smart Grid 139 (16)
Infrastructure
Adnan Anwar
Abdun Naser Mahmood
Chapter 7 Intrusion Detection and 155 (32)
Prevention in Cyber Physical Systems
Mohamed Azab
Mohamed Eltoweissy
Chapter 8 Encrypted Ranked Proximity and 187 (24)
Phrase Searching in the Cloud
Steven Zittrower
Cliff C. Zou
Chapter 9 Intrusion Detection for SCADA 211 (22)
Systems
Alaa Atassi
Imad H. Elhajj
Ali Chehab
Ayman Kayssi
Chapter 10 Hardware Techniques for 233 (26)
High-Performance Network Intrusion Detection
Weirong Jiang
Viktor K. Prasanna
SECTION III Artificial Intelligence
Techniques for IDS
Chapter 11 New Unknown Attack Detection 259 (26)
with the Neural Network--Based IDS
Przemyslaw Kukielka
Zbigniew Kotulski
Chapter 12 Artificial Intelligence--Based 285 (26)
Intrusion Detection Techniques
Zahra Jadidi
Vallipuram Muthukkumarasamy
Elankayer Sithirasenan
Chapter 13 Applications of Machine Learning 311 (24)
in Intrusion Detection
Yuxin Meng
Yang Xiang
Lam-For Kwok
SECTION IV IDS for Wireless Systems
Chapter 14 Introduction to Wireless 335 (26)
Intrusion Detection Systems
Jonny Milliken
Chapter 15 Cross Layer--Based Intrusion 361 (30)
Detection Techniques in Wireless Networks:
A Survey
Subir Halder
Amrita Ghosal
Chapter 16 Intrusion Detection System 391 (16)
Architecture for Wireless Sensor Network
Mohammad Saiful Islam Mamun
Chapter 17 Unique Challenges in WiFi 407 (24)
Intrusion Detection
Jonny Milliken
Chapter 18 Intrusion Detection Systems for 431 (18)
(Wireless) Automation Systems
Jana Krimmling
Peter Langendorfer
Chapter 19 An Innovative Approach of 449 (24)
Blending Security Features in
Energy-Efficient Routing for a Crowded
Network of Wireless Sensors
Al-Sakib Khan Pathan
Tarem Ahmed
Index 473