Intrusion Detection With Mondrian and Snort
Added Value Of OLAP Techniques For IDS Event Analysis
This book proposes to show the added value of OLAP
techniques for IDS event analysis. It will discuss
the currently available tools that are used together
with the IDS Snort to build a strong security system.
This will help the reader to understand what...
techniques for IDS event analysis. It will discuss
the currently available tools that are used together
with the IDS Snort to build a strong security system.
This will help the reader to understand what...
Leider schon ausverkauft
versandkostenfrei
Buch
49.00 €
Produktdetails
Produktinformationen zu „Intrusion Detection With Mondrian and Snort “
Klappentext zu „Intrusion Detection With Mondrian and Snort “
This book proposes to show the added value of OLAPtechniques for IDS event analysis. It will discuss
the currently available tools that are used together
with the IDS Snort to build a strong security system.
This will help the reader to understand what an IDS
is and what tools can help in analyzing IDS events.
The book will also cover the topic of OLAP and the
features that are important when developing an OLAP
based analysis system. Finally, the book will show
the reader how to build a cube with open source
tools. The steps taken to install Snort are discussed
including the interconnection with programs such as
MySQL for the collection of alerts . It explains some
of the most interesting possibilities for analyzing
data and evaluates the most popular open source
reporting tools for Snort.
To conclude it will show the result of building a
cube with Mondrian and the possibilities for
analyzing the data with a web-based front end using
JPivot.
Bibliographische Angaben
- Autor: Gerhard Jauk
- 2009, 88 Seiten, Maße: 22 cm, Kartoniert (TB), Deutsch
- Verlag: VDM Verlag Dr. Müller
- ISBN-10: 3639140524
- ISBN-13: 9783639140521
Kommentar zu "Intrusion Detection With Mondrian and Snort"
0 Gebrauchte Artikel zu „Intrusion Detection With Mondrian and Snort“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Intrusion Detection With Mondrian and Snort".
Kommentar verfassen