Recent Advances in Intrusion Detection: 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings

Author:   Andreas Wespi ,  Giovanni Vigna ,  Luca Deri
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2002 ed.
Volume:   2516
ISBN:  

9783540000204


Pages:   327
Publication Date:   02 October 2002
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $197.87 Quantity:  
Add to Cart

Share |

Recent Advances in Intrusion Detection: 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, RAID 2002, held in Zurich, Switzerland, in October 2002. The 16 revised full papers presented were carefully reviewed and selected from a total of 81 submissions. The papers are organized in topical sections on stepping stone detection, anomality detection, correlation, legal aspects and intrusion tolerance, assessment of intrusion detection systems, adaptive intrusion detection systems, intrusion detection analysis.

Full Product Details

Author:   Andreas Wespi ,  Giovanni Vigna ,  Luca Deri
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2002 ed.
Volume:   2516
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.30cm
Weight:   1.070kg
ISBN:  

9783540000204


ISBN 10:   3540000208
Pages:   327
Publication Date:   02 October 2002
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Stepping Stone Detection.- Detecting Long Connection Chains of Interactive Terminal Sessions.- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay.- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.- Anomaly Detection.- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits.- Correlation.- Analyzing Intensive Intrusion Alerts via Correlation.- A Mission-Impact-Based Approach to INFOSEC Alarm Correlation.- M2D2: A Formal Data Model for IDS Alert Correlation.- Legal Aspects / Intrusion Tolerance.- Development of a Legal Framework for Intrusion Detection.- Learning Unknown Attacks - A Start.- Assessment of Intrusion Detection Systems.- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems.- A Stochastic Model for Intrusions.- Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool.- Capacity Verification for High Speed Network Intrusion Detection Systems.- Adaptive Intrusion Detection Systems.- Performance Adaptation in Real-Time Intrusion Detection Systems.- Intrusion Detection Analysis.- Accurate Buffer Overflow Detection via Abstract Pay load Execution.- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level.- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List