Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Understanding intrusion detection through visualizationUnderstanding intrusion detection through visualization

Understanding intrusion detection through visualization

Stefan Axelsson, David Sands

About this book

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. This volume presents four different visualization approaches, mainly applied to data from web server access logs. Understanding Intrusion Detection through Visualization is structured for security professionals, researchers and practitioners. This book is also suitable for graduate students in computer science.

Details

OL Work ID
OL19908572W

Subjects

Computer networksInformation visualizationSecurity measuresComputer securityIntrusion detection systems (Computer security)Systèmes informatiquesSécuritéMesuresAntiprogrammes (Informatique)CyberterrorismeSécurité informatiqueFausses alarmesCOMPUTERSInternetSecurityNetworkingGeneralInformatique

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.