|
![]() |
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, RAID 2002, held in Zurich, Switzerland, in October 2002. The 16 revised full papers presented were carefully reviewed and selected from a total of 81 submissions. The papers are organized in topical sections on stepping stone detection, anomality detection, correlation, legal aspects and intrusion tolerance, assessment of intrusion detection systems, adaptive intrusion detection systems, intrusion detection analysis. Full Product DetailsAuthor: Andreas Wespi , Giovanni Vigna , Luca DeriPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2002 ed. Volume: 2516 Dimensions: Width: 15.50cm , Height: 1.80cm , Length: 23.30cm Weight: 1.070kg ISBN: 9783540000204ISBN 10: 3540000208 Pages: 327 Publication Date: 02 October 2002 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsStepping Stone Detection.- Detecting Long Connection Chains of Interactive Terminal Sessions.- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay.- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.- Anomaly Detection.- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits.- Correlation.- Analyzing Intensive Intrusion Alerts via Correlation.- A Mission-Impact-Based Approach to INFOSEC Alarm Correlation.- M2D2: A Formal Data Model for IDS Alert Correlation.- Legal Aspects / Intrusion Tolerance.- Development of a Legal Framework for Intrusion Detection.- Learning Unknown Attacks - A Start.- Assessment of Intrusion Detection Systems.- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems.- A Stochastic Model for Intrusions.- Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool.- Capacity Verification for High Speed Network Intrusion Detection Systems.- Adaptive Intrusion Detection Systems.- Performance Adaptation in Real-Time Intrusion Detection Systems.- Intrusion Detection Analysis.- Accurate Buffer Overflow Detection via Abstract Pay load Execution.- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level.- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |