Recent advances in intrusion detection : 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002 : proceedings / Andeas Wespi, Giovanni Vigna, Luca Deri (eds.)

This book constitutes the refereed proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, RAID 2002, held in Zurich, Switzerland, in October 2002. The 16 revised full papers presented were carefully reviewed and selected from a total of 81 submissions. The papers a...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: RAID (Symposium) Zurich, Switzerland)
Other Authors: Wespi, Andreas, 1963-, Vigna, Giovanni, Deri, Luca, 1968-
Format: Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer-Verlag, 2002.
Series:Lecture notes in computer science ; 2516.
Subjects:
Table of Contents:
  • Stepping Stone Detection
  • Detecting Long Connection Chains of Interactive Terminal Sessions
  • Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay
  • Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses
  • Anomaly Detection
  • Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits
  • Correlation
  • Analyzing Intensive Intrusion Alerts via Correlation
  • A Mission-Impact-Based Approach to INFOSEC Alarm Correlation
  • M2D2: A Formal Data Model for IDS Alert Correlation
  • Legal Aspects / Intrusion Tolerance
  • Development of a Legal Framework for Intrusion Detection
  • Learning Unknown Attacks
  • A Start
  • Assessment of Intrusion Detection Systems
  • Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems
  • A Stochastic Model for Intrusions
  • Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool
  • Capacity Verification for High Speed Network Intrusion Detection Systems
  • Adaptive Intrusion Detection Systems
  • Performance Adaptation in Real-Time Intrusion Detection Systems
  • Intrusion Detection Analysis
  • Accurate Buffer Overflow Detection via Abstract Pay load Execution
  • Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level
  • The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.