Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002
Editor
Andreas Wespi, Giovanni Vigna, Luca Deri
Publication Date
2002-01-01
Contents
Stepping Stone Detection
-Detecting Long Connection Chains of Interactive Terminal Sessions
-Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay
-Detecting Malicious Software by Monitoring Anomalous Windows Registry Access
Anomaly Detection
-Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits
Correlation
-Analyzing Intensive Intrusion Alerts via Correlation
-A Mission-Impact-Based Approach to INFOSEC Alarm Correlation
-M2D2: A Formal Data Model for IDS Alert Correlation
Legal Aspects/Intrusion Tolerance
-Development of a Legal Framework for Intrusion Detection
-Learning Unknown Attacks - A Start
Assessment of Intrusion Detection Systems
-Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems
-A Stochastic Model for Intrusions
-Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool
-Capacity Verification for High Speed Network Intrusion Detection Systems
Adaptive Intrusion Detection Systems
-Performance Adaptation in Real-Time Intrusion Detection Systems
Intrusion Detection Analysis
-Accurate Buffer Overflow Detection via Abstract Payload Execution
-Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level
-The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection
Keywords
Intrusion Detection
Location
A hard-copy of this is in the CERIAS Library