Active Members Fi8sVrs Posted February 9, 2014 Active Members Report Posted February 9, 2014 Dedicated to“All the seekers of knowledge and the truth”Al-Sakib Khan Pathan ContentsPreface...............................................................................................................................................ixAcknowledgments .............................................................................................................................xiEditor .............................................................................................................................................xiiiContributors .....................................................................................................................................xvPART I Network Traf?c Analysis and Management for IDSChapter 1Outlier Detection ..........................................................................................................3 Mohiuddin Ahmed, Abdun Naser Mahmood, and Jiankun HuChapter 2Network Traf?c Monitoring and Analysis .................................................................23 Jeferson Wilian de Godoy Stênico and Lee Luan LingChapter 3Using Routers and Honeypots in Combination for Collecting Internet Worm Attacks ........................................................................................................................47 Mohssen Mohammed and Al-Sakib Khan PathanChapter 4Attack Severity–Based Honeynet Management Framework......................................85 Asit More and Shashikala TapaswiPART II IDS Issues for Different InfrastructuresChapter 5Intrusion Detection Systems for Critical Infrastructure ..........................................115 Bernardi Pranggono, Kieran McLaughlin, Yi Yang, and Sakir Sezer Chapter 6Cyber Security of Smart Grid Infrastructure ...........................................................139 Adnan Anwar and Abdun Naser Mahmood Chapter 7Intrusion Detection and Prevention in Cyber Physical Systems ..............................155 Mohamed Azab and Mohamed EltoweissyChapter 8Encrypted Ranked Proximity and Phrase Searching in the Cloud ..........................187Steven Zittrower and Cliff C. ZouviiiContentsChapter 9Intrusion Detection for SCADA Systems .................................................................211 Alaa Atassi, Imad H. Elhajj, Ali Chehab, and Ayman KayssiChapter 10Hardware Techniques for High-Performance Network Intrusion Detection ...........233Weirong Jiang and Viktor K. PrasannaPART III Arti?cial Intelligence Techniques for IDSChapter 11New Unknown Attack Detection with the Neural Network–Based IDS .................259Przemys?aw Kukie?ka and Zbigniew KotulskiChapter 12Arti?cial Intelligence-Based Intrusion Detection Techniques .................................285 Zahra Jadidi, Vallipuram Muthukkumarasamy, and Elankayer SithirasenanChapter 13Applications of Machine Learning in Intrusion Detection ......................................311Yuxin Meng, Yang Xiang, and Lam-For Kwok PART IV IDS for Wireless SystemsChapter 14Introduction to Wireless Intrusion Detection Systems .............................................335 Jonny MillikenChapter 15Cross Layer–Based Intrusion Detection Techniques in Wireless Networks: A Survey ...................................................................................................................361Subir Halder and Amrita GhosalChapter 16Intrusion Detection System Architecture for Wireless Sensor Network..................391 Mohammad Saiful Islam MamunChapter 17Unique Challenges in WiFi Intrusion Detection ......................................................407 Jonny MillikenChapter 18Intrusion Detection Systems for (Wireless) Automation Systems ...........................431 Jana Krimmling and Peter Langendoerfer Chapter 19An Innovative Approach of Blending Security Features in Energy-Ef?cient Routing for a Crowded Network of Wireless Sensors ..............................................449 Al-Sakib Khan Pathan and Tarem Ahmed The State of the Art in Intrusion Prevention and Detection Quote