CHAPTER

13   Detection Foundation

Overview

•   13.1 The Role of Detection

•   13.2 How Detection Systems Work

•   13.3 Feature Selection

•   13.3.1 Attack Manifestation in Features

•   13.3.2 Manifestation Strength

•   13.3.3 Mapping Attacks to Features

•   13.3.4 Criteria for Selection

•   13.4 Feature Extraction

•   13.5 Event Selection

•   13.6 Event Detection

•   13.7 Attack Detection

•   13.8 Attack Classification

•   13.9 Attack Alarming

•   13.10 Know Operational Performance Characteristics for Sensors

Learning Objectives

•   Explain the synergy between prevention and detection techniques.

•   Enumerate and describe the seven layers of detection systems.

•   Define feature selection and its pivotal role in attack detection.

•   Explain ...

Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.