Recent Advances in Intrusion Detection 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings /
Recent Advances in Intrusion Detection 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / [electronic resource] :
edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel.
- 1st ed. 2003.
- X, 242 p. online resource.
- Lecture Notes in Computer Science, 2820 1611-3349 ; .
- Lecture Notes in Computer Science, 2820 .
Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
9783540452485
10.1007/b13476 doi
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computer networks .
Computer science.
Operating systems (Computers).
Computers and civilization.
IT Operations.
Cryptology.
Computer Communication Networks.
Computer Science.
Operating Systems.
Computers and Society.
QA76.9.M3
004.068
Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
9783540452485
10.1007/b13476 doi
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computer networks .
Computer science.
Operating systems (Computers).
Computers and civilization.
IT Operations.
Cryptology.
Computer Communication Networks.
Computer Science.
Operating Systems.
Computers and Society.
QA76.9.M3
004.068