Recent Advances in Intrusion Detection Third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 Proceedings /

Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experimen...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Debar, Herve (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Me, Ludovic (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Wu, S. Felix (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
Έκδοση:1st ed. 2000.
Σειρά:Lecture Notes in Computer Science, 1907
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05419nam a2200625 4500
001 978-3-540-39945-2
003 DE-He213
005 20191024051736.0
007 cr nn 008mamaa
008 121227s2000 gw | s |||| 0|eng d
020 |a 9783540399452  |9 978-3-540-39945-2 
024 7 |a 10.1007/3-540-39945-3  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Recent Advances in Intrusion Detection  |h [electronic resource] :  |b Third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 Proceedings /  |c edited by Herve Debar, Ludovic Me, S. Felix Wu. 
250 |a 1st ed. 2000. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2000. 
300 |a X, 230 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1907 
505 0 |a Logging -- Better Logging through Formality -- A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions -- Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection -- Data Mining -- A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions -- Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report -- Modeling Process Behavior -- Adaptive, Model-Based Monitoring for Cyber Attack Detection -- A Real-Time Intrusion Detection System Based on Learning Program Behavior -- Intrusion Detection Using Variable-Length Audit Trail Patterns -- Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects -- IDS Evaluation -- The 1998 Lincoln Laboratory IDS Evaluation -- Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation -- Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems -- Modeling -- LAMBDA: A Language to Model a Database for Detection of Attacks -- Target Naming and Service Apoptosis. 
520 |a Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Computers and civilization. 
650 0 |a Operating systems (Computers). 
650 1 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
650 2 4 |a Computers and Society.  |0 http://scigraph.springernature.com/things/product-market-codes/I24040 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
700 1 |a Debar, Herve.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Me, Ludovic.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Wu, S. Felix.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662214282 
776 0 8 |i Printed edition:  |z 9783540410850 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1907 
856 4 0 |u https://doi.org/10.1007/3-540-39945-3  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)