×
Loading...

Recent advances in intrusion detection : 4th international symposium, RAID 2001, Davis, CA, USA, October 2001 : proceedings by RAID (Symposium) (4th : 2001 : Davis, Ca...

Book Information

TitleRecent advances in intrusion detection : 4th international symposium, RAID 2001, Davis, CA, USA, October 2001 : proceedings
CreatorRAID (Symposium) (4th : 2001 : Davis, Calif.), Lee, Wenke, 1966-, Mé, Ludovic, 1963-, Wespi, Andreas, 1963-
Year2001
PPI300
PublisherBerlin ; New York : Springer
LanguageEnglish
Mediatypetexts
SubjectIntrusion detection systems (Computer security), cryptanalyse, fouille donnée, analyse modèle, authentification, vie privée, détection intrusion, Sécurité informatique, Ordinateurs, Intrusion detection systems (Computer security), Systèmes informatiques, Ordinateurs, RAID, intrusion detection
ISBN3540427023, 9783540427025
Collectionjournals_contributions, journals
Uploadersketch
Identifierspringer_10.1007-3-540-45474-8
Telegram icon Share on Telegram
Download Now

Description

Recent Advances in Intrusion Detection: 4th International Symposium, RAID 2001 Davis, CA, USA, October 10–12, 2001 ProceedingsAuthor: Wenke Lee, Ludovic Mé, Andreas Wespi Published by Springer Berlin Heidelberg ISBN: 978-3-540-42702-5 DOI: 10.1007/3-540-45474-8Table of Contents:From Declarative Signatures to Misuse IDS Application-Integrated Data Collection for Security Monitoring Interfacing Trusted Applications with Intrusion Detection Systems Probabilistic Alert Correlation Designing a Web of Highly-Configurable Intrusion Detection Sensors Aggregation and Correlation of Intrusion-Detection Alerts Accurately Detecting Source Code of Attacks That Increase Privilege CDIS: Towards a Computer Immune System for Detecting Network Intrusions Autonomic Response to Distributed Denial of Service Attacks The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information Experiences with Specification-Based Intrusion Detection System Health and Intrusion Monitoring Using a Hierarchy of Constraints, Includes bibliographical references and index, From Declarative Signatures to Misuse IDS / Jean-Philippe Pouzol and Mireille Ducasse -- Application-Integrated Data Collection for Security Monitoring / Magnus Almgren and Ulf Lindqvist -- Interfacing Trusted Applications with Intrusion Detection Systems / Marc Welz and Andrew Hutchison -- Probabilistic Alert Correlation / Alfonso Valdes and Keith Skinner -- Designing a Web of Highly-Configurable Intrusion Detection Sensors / Giovanni Vigna, Richard A. Kemmerer and Per Blix -- Aggregation and Correlation of Intrusion-Detection Alerts / Herve Debar and Andreas Wespi -- Accurately Detecting Source Code of Attacks That Increase Privilege / Robert A. Cunningham and Craig S. Stevenson -- CDIS: Towards a Computer Immune System for Detecting Network Intrusions / Paul D. Williams, Kevin P. Anchor and John L. Bebo / [et al.] -- Autonomic Response to Distributed Denial of Service Attacks / Dan Sterne, Kelly Djahandari and Brett Wilson / [et al.] -- The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information / Steven R. Johnston -- Experiences with Specification-Based Intrusion Detection / Prem Uppuluri and R. Sekar -- System Health and Intrusion Monitoring Using a Hierarchy of Constraints / Calvin Ko, Paul Brutch and Jeff Rowe / [et al.]