Recent Advances in Intrusion Detection 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings /

On behalf of the program committee, it is our pleasure to present to you the proceedings of the Fifth Symposium on Recent Advances in Intrusion Detection (RAID). Since its ?rst edition in 1998, RAID has established itself as the main annual intrusion detection event, attracting researchers, practiti...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Wespi, Andreas (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Vigna, Giovanni (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Deri, Luca (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2516
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Stepping Stone Detection
  • Detecting Long Connection Chains of Interactive Terminal Sessions
  • Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay
  • Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses
  • Anomaly Detection
  • Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits
  • Correlation
  • Analyzing Intensive Intrusion Alerts via Correlation
  • A Mission-Impact-Based Approach to INFOSEC Alarm Correlation
  • M2D2: A Formal Data Model for IDS Alert Correlation
  • Legal Aspects / Intrusion Tolerance
  • Development of a Legal Framework for Intrusion Detection
  • Learning Unknown Attacks - A Start
  • Assessment of Intrusion Detection Systems
  • Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems
  • A Stochastic Model for Intrusions
  • Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool
  • Capacity Verification for High Speed Network Intrusion Detection Systems
  • Adaptive Intrusion Detection Systems
  • Performance Adaptation in Real-Time Intrusion Detection Systems
  • Intrusion Detection Analysis
  • Accurate Buffer Overflow Detection via Abstract Pay load Execution
  • Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level
  • The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.