Thumbnail
Access Restriction
Subscribed

Author State, Radu
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Richard Bejtlich, Addison-Wesley Professional, 2005, \$49.99, ISBN: 0321349962Although most readers are probably familiar with the term intrusion detectionand its general underlying function, they are probably not familiar with extrusiondetection, a new concept that may become an emerging key technology in networksecurity. Behind this concept is a series of techniques and approaches for monitoringoutbound connections in order to detect a potential intruder or a violation ofin-place security policies. Outbound connections are initiated from your networktoward the outside, and, at first glance, monitoring them seems to be just asimple and straightforward extension of general network monitoring.
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2010-04-01
Publisher Place New York
Journal Queue (QUEUE)
Volume Number 4
Issue Number 3


Open content in new tab

   Open content in new tab
Source: ACM Digital Library