Recent advances in intrusion detection : 4th international symposium, RAID 2001, Davis, CA, USA, October 2001
Author: RAID (Symposium) (4th : 2001 : Davis, Calif.), Lee, Wenke, 1966-, Mé, Ludovic, 1963-, Wespi, Andreas, 1963-
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Intrusion detection systems (Computer security), cryptanalyse, fouille donnée, analyse modèle, authentification, vie privée, détection intrusion, Sécurité informatique, Ordinateurs, Intrusion detection systems (Computer security), Systèmes informatiques, Ordinateurs, RAID, intrusion detection
Publishers: Berlin ; New York : Springer
Collections: journals contributions, journals
ISBN Number: 3540427023, 9783540427025
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 107.44 MB
PDF Size: 2.88 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Edition: [Elektronische Ressource]
Downloads: 547
Views: 597
Total Files: 18
Media Type: texts
Total Files: 5
Last Modified: 2023-05-26 03:12:11
Size: 8.29 KB
Description
Author: Wenke Lee, Ludovic Mé, Andreas Wespi
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42702-5
DOI: 10.1007/3-540-45474-8
Table of Contents:
- From Declarative Signatures to Misuse IDS
- Application-Integrated Data Collection for Security Monitoring
- Interfacing Trusted Applications with Intrusion Detection Systems
- Probabilistic Alert Correlation
- Designing a Web of Highly-Configurable Intrusion Detection Sensors
- Aggregation and Correlation of Intrusion-Detection Alerts
- Accurately Detecting Source Code of Attacks That Increase Privilege
- CDIS: Towards a Computer Immune System for Detecting Network Intrusions
- Autonomic Response to Distributed Denial of Service Attacks
- The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information
- Experiences with Specification-Based Intrusion Detection
- System Health and Intrusion Monitoring Using a Hierarchy of Constraints
Includes bibliographical references and index
From Declarative Signatures to Misuse IDS / Jean-Philippe Pouzol and Mireille Ducasse -- Application-Integrated Data Collection for Security Monitoring / Magnus Almgren and Ulf Lindqvist -- Interfacing Trusted Applications with Intrusion Detection Systems / Marc Welz and Andrew Hutchison -- Probabilistic Alert Correlation / Alfonso Valdes and Keith Skinner -- Designing a Web of Highly-Configurable Intrusion Detection Sensors / Giovanni Vigna, Richard A. Kemmerer and Per Blix -- Aggregation and Correlation of Intrusion-Detection Alerts / Herve Debar and Andreas Wespi -- Accurately Detecting Source Code of Attacks That Increase Privilege / Robert A. Cunningham and Craig S. Stevenson -- CDIS: Towards a Computer Immune System for Detecting Network Intrusions / Paul D. Williams, Kevin P. Anchor and John L. Bebo / [et al.] -- Autonomic Response to Distributed Denial of Service Attacks / Dan Sterne, Kelly Djahandari and Brett Wilson / [et al.] -- The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information / Steven R. Johnston -- Experiences with Specification-Based Intrusion Detection / Prem Uppuluri and R. Sekar -- System Health and Intrusion Monitoring Using a Hierarchy of Constraints / Calvin Ko, Paul Brutch and Jeff Rowe / [et al.]