Recent Advances in Intrusion Detection Third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 Proceedings /

Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experimen...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Debar, Herve (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Me, Ludovic (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Wu, S. Felix (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
Έκδοση:1st ed. 2000.
Σειρά:Lecture Notes in Computer Science, 1907
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Logging
  • Better Logging through Formality
  • A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions
  • Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
  • Data Mining
  • A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions
  • Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report
  • Modeling Process Behavior
  • Adaptive, Model-Based Monitoring for Cyber Attack Detection
  • A Real-Time Intrusion Detection System Based on Learning Program Behavior
  • Intrusion Detection Using Variable-Length Audit Trail Patterns
  • Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects
  • IDS Evaluation
  • The 1998 Lincoln Laboratory IDS Evaluation
  • Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
  • Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems
  • Modeling
  • LAMBDA: A Language to Model a Database for Detection of Attacks
  • Target Naming and Service Apoptosis.