|
![]() |
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, RAID 2000, held in Toulouse, France in October 2000. The 14 revised full papers presented were carefully reviewed and selected from a total of 26 papers and 30 extended abstracts submitted. The papers are organized in sections on logging, data mining, modeling process behaviour, IDS evaluation, and modeling. Full Product DetailsAuthor: Herve Debar , Ludovic Me , S. Felix WuPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2000 ed. Volume: 1907 Dimensions: Width: 15.50cm , Height: 1.30cm , Length: 23.50cm Weight: 0.770kg ISBN: 9783540410850ISBN 10: 3540410856 Pages: 230 Publication Date: 20 September 2000 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsLogging.- Better Logging through Formality.- A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions.- Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection.- Data Mining.- A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions.- Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.- Modeling Process Behavior.- Adaptive, Model-Based Monitoring for Cyber Attack Detection.- A Real-Time Intrusion Detection System Based on Learning Program Behavior.- Intrusion Detection Using Variable-Length Audit Trail Patterns.- Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects.- IDS Evaluation.- The 1998 Lincoln Laboratory IDS Evaluation.- Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation.- Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems.- Modeling.- LAMBDA: A Language to Model a Database for Detection of Attacks.- Target Naming and Service Apoptosis.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |