26,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

The use of computer network technology in all spheres of human endeavors be it in business, social media and academic activities has greatly increased. Due to this excessive use of computer network, series of security treat has been staged to defraud un-suspected users. The integrity of data, unauthorized access and availability of computer network must be protected from intrusion. Network-based intrusion has become a major threat to today's highly networked information systems because the effects of intrusions are disastrous to the network users. Security mechanism such as authentication,…mehr

Produktbeschreibung
The use of computer network technology in all spheres of human endeavors be it in business, social media and academic activities has greatly increased. Due to this excessive use of computer network, series of security treat has been staged to defraud un-suspected users. The integrity of data, unauthorized access and availability of computer network must be protected from intrusion. Network-based intrusion has become a major threat to today's highly networked information systems because the effects of intrusions are disastrous to the network users. Security mechanism such as authentication, cryptography, access control and firewall are used as defense but are unable to detect an intrusion internally and counter it. A wide variety of algorithms have been proposed and implemented for intrusion detection; and some of these algorithms are: intrusion preventions system (IPS), intrusion response system (IRS) and Tracing based active intrusion response (TBAIR) algorithm. In this research, the Tracing based active intrusion response (TBAIR) algorithm will be applied as a countermeasure and tracking of an intruder activities to determine its effectiveness.
Autorenporträt
Agbaje Isaiah nació en Nigeria y tiene una licenciatura y un máster en Informática. Sus campos de investigación son: Intrusión en la red, detección y respuesta activa a la intrusión basada en el rastreo (TBAIR).