O'Reilly logo

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time by O. Sami Saydjari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER

13   Detection Foundation

Overview

•   13.1 The Role of Detection

•   13.2 How Detection Systems Work

•   13.3 Feature Selection

•   13.3.1 Attack Manifestation in Features

•   13.3.2 Manifestation Strength

•   13.3.3 Mapping Attacks to Features

•   13.3.4 Criteria for Selection

•   13.4 Feature Extraction

•   13.5 Event Selection

•   13.6 Event Detection

•   13.7 Attack Detection

•   13.8 Attack Classification

•   13.9 Attack Alarming

•   13.10 Know Operational Performance Characteristics for Sensors

Learning Objectives

•   Explain the synergy between prevention and detection techniques.

•   Enumerate and describe the seven layers of detection systems.

•   Define feature selection and its pivotal role in attack detection.

•   Explain ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required