Guidance for Selecting Data Collection Mechanisms for Intrusion Detection

Guidance for Selecting Data Collection Mechanisms for Intrusion Detection

Ulf Larson, Erland Jonsson, Stefan Lindskog
Copyright: © 2015 |Pages: 31
ISBN13: 9781466673816|ISBN10: 1466673818|EISBN13: 9781466673823
DOI: 10.4018/978-1-4666-7381-6.ch016
Cite Chapter Cite Chapter

MLA

Larson, Ulf, et al. "Guidance for Selecting Data Collection Mechanisms for Intrusion Detection." Handbook of Research on Emerging Developments in Data Privacy, edited by Manish Gupta, IGI Global, 2015, pp. 340-370. https://doi.org/10.4018/978-1-4666-7381-6.ch016

APA

Larson, U., Jonsson, E., & Lindskog, S. (2015). Guidance for Selecting Data Collection Mechanisms for Intrusion Detection. In M. Gupta (Ed.), Handbook of Research on Emerging Developments in Data Privacy (pp. 340-370). IGI Global. https://doi.org/10.4018/978-1-4666-7381-6.ch016

Chicago

Larson, Ulf, Erland Jonsson, and Stefan Lindskog. "Guidance for Selecting Data Collection Mechanisms for Intrusion Detection." In Handbook of Research on Emerging Developments in Data Privacy, edited by Manish Gupta, 340-370. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-7381-6.ch016

Export Reference

Mendeley
Favorite

Abstract

This chapter aims at providing a clear and concise picture of data collection for intrusion detection. It provides a detailed explanation of generic data collection mechanism components and the interaction with the environment, from initial triggering to output of log data records. Taxonomies of mechanism characteristics and deployment considerations are provided and discussed. Furthermore, guidelines and hints for mechanism selection and deployment are provided. Finally, this chapter presents a set of strategies for determining what data to collect, and it also discusses some of the challenges in the field. An appendix providing a classification of 50 studied mechanisms is also provided. This chapter aims at assisting intrusion detection system developers, designers, and operators in selecting mechanisms for resource-efficient data collection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.