
21
Computer Security
Olga Ohrimenko
Brown University
Charalampos
Papamanthou
University of California,
Berkeley
Bernardo Palazzi
Brown University and Italian
National Institute of Statistics
21.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
Motivation
•
Chapter Organization
21.2 Network Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656
Intrusion Detection
•
Traffic Analysis
•
Internal vs. External
Hosts
•
Similarity Analysis for Traffic Logs and Scans
•
Visualization of Address Space
•
Visualization of Name
Server Migration
21.3 Border Gateway Protocol . . . . .