Part I: Networking Basics: TCP/IP Network Statistics Evaluation Part II: Intrusion Detection: Network Monitoring Host Monitoring Part III: Viruses and Other Creatures: Computer Viruses and Worms Trojan Programs and Covert Channels Appendices: Well Known Port Numbers Trojan Port Numbers Country Codes Security Web Sites
Part I: Networking Basics: TCP/IP * Network Statistics * Evaluation * Part II: Intrusion Detection: Network Monitoring * Host Monitoring * Part III: Viruses and Other Creatures: Computer Viruses and Worms * Trojan Programs and Covert Channels * Appendices: Well Known Port Numbers * Trojan Port Numbers * Country Codes * Security Web Sites
This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.
This book discusses the timely topic of computer intrusion. It is the first book to present a data-centered approach to these problems, and it will be of interest to researchers and practitioners in statistics and computer science interested in computer security. The book is self -contained, assuming no expertise in computer security or statistics.