Skip to main content

Computer Network Defense

  • Chapter
  • First Online:
The NICE Cyber Security Framework

Abstract

Intrusion sets are “sets of related incidents” (D’Amico and Whitley 2008) that have been collated over time, e.g., a series of incidents from a single actor or targeting a particular resource. Similar incidents can be grouped into intrusion or problem sets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • D’Amico A, Whitley K (2008) The real work of computer network defense analysts: the analysis roles and processes that transform network data into security situation awareness. In: Proceedings of the workshop on visualization for computer security, Berlin, Heidelberg, pp 19–37

    Google Scholar 

  • Lilly B, Moore AS, Hodson QE, Weishoff D (2021) RAND’s scalable warning and resilience model (SWARM): enhancing defenders’ predictive power in cyberspace. RAND Corp

    Google Scholar 

  • Xu H, Zhou Y, Ming J, Lyu M (2020) Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. Cybersecurity 3(1):1–18

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alsmadi, I. (2023). Computer Network Defense. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-031-21651-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21651-0_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21650-3

  • Online ISBN: 978-3-031-21651-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics