sitemap | contact us
      
 
  Book Series
  Journals
  Book Proposal Form
 
  Using Published Material
  Rights and Permissions
  Examination Copies
   
   
  List of Publishers
  Bargains
   
   
  Services
   
   
  About Narosa
  History
  Mission
  Group Companies
  Our Strength
  Alliances
   
   
   
 
view in print mode
Network Security: Issues, Challenges and Techniques
Editor(s): Nityananda Sarma, Dhruba K. Bhattacharyya

ISBN:    978-81-8487-088-6 
E-ISBN:   E 978-81-8487-313-9
Publication Year:   2010
Pages:   182
Binding:   Hard Back
Dimension:   185mm x 240mm
Weight:   560



About the book

As the advances in networking technology help to connect any part of the globe, and openness and scalability of the Internet is opening up a number of new on-line applications, the threats from attackers has also grown drastically. In recent years, attackers have shown increasing sophistication in their ability to launch attacks which threaten the security of the devices connected to the Internet. Accordingly, this volume covers - design of an effective Intrusion Detection Systems (IDS), clustering techniques in designing anomaly based IDS, network traffic analysis for security analysis, special properties of Elliptic curves in the context of designing security tools, use of a spatio-temporal logic for checking anomalies in filtering rules as model checking in PSPACE, automated intrusion signatures generation technique, use of sensor fusion in IDS, mechanisms for SPIT prevention, detection mechanism for SQL injection attacks, prevention of unknown malware attack, vulnerabilities in web browsers, security issues in ICMP, reputation systems for online community, copyright protection of digital image, multimedia encryption techniques, attacks and countermeasures in WSNs, WMNs, and P2P networks, key agreement and authentication protocols in UMTS.



Table of Contents

Foreword / Preface / Acknowledgement / Supersingularity and Cyclicity of Elliptic Curves / High-Speed Network Traffic Analysis: Challenges and Approaches / SSL Automated Signatures / Carving Rule-based Filters within a Spatio-temporal Logic / Unsupervised Anomaly Detection using Incremental Subspace Clustering / Security Attacks and Countermeasures in Wireless Sensor Networks / Detection of Wormhole Attacks in Wireless Mesh Networks / Modified UMTS Authentication and Key Agreement Protocol for Enhanced User Identity Confidentiality / Use of Sensor Fusion in Intrusion Detection System: A Survey / An Effective Detection Mechanism of SQL Injection Attack / Security Issues in ICMPv4 / Vulnerabilities in Web Browsers / SPIT Preventions: A Study on the Existing Solutions / Anomaly based Intrusion Detection using Incremental Approach: A Survey / Robust Invisible Adaptive-watermark Scheme for Copyright Protection of Digital Images / Issues of Fairness in Reputation Systems for Online Community: A Survey / A Survey on Security Measures used in Peer-to-Peer System / A Review on Applications of Multimedia Encryption / Preventing Unknown Malware Attack by using Intelligence Intrusion Multi Detection Prevention System / Author Index / Committees.




Audience

Undergraduate Students, Teachers and Researchers


CLICK HERE


Group
| Companies | Mission | Strength | Values | History | Contact us
© Narosa Publishing House