default search action
5. RAID 2002: Zurich, Switzerland
- Andreas Wespi, Giovanni Vigna, Luca Deri:
Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings. Lecture Notes in Computer Science 2516, Springer 2002, ISBN 3-540-00020-8
Stepping Stone Detection
- Kwong H. Yung:
Detecting Long Connection Chains of Interactive Terminal Sessions. 1-16 - David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford:
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. 17-35 - Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo:
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. 36-53
Anomaly Detection
- Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion:
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. 54-73
Correlation
- Peng Ning, Yun Cui, Douglas S. Reeves:
Analyzing Intensive Intrusion Alerts via Correlation. 74-94 - Phillip A. Porras, Martin W. Fong, Alfonso Valdes:
A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. 95-114 - Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé:
M2D2: A Formal Data Model for IDS Alert Correlation. 115-127
Legal Aspects / Intrusion Tolerance
- Steven R. Johnston:
Development of a Legal Framework for Intrusion Detection. 138-157 - James E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe:
Learning Unknown Attacks - A Start. 158-176
Assessment of Intrusion Detection Systems
- Hervé Debar, Benjamin Morin:
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. 177-198 - Robert P. Goldman:
A Stochastic Model for Intrusions. 199-218 - Vladimir I. Gorodetski, Igor V. Kotenko:
Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool. 219-238 - Mike Hall, Kevin Wiley:
Capacity Verification for High Speed Network Intrusion Detection Systems. 239-251
Adaptive Intrusion Detection Systems
- Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang:
Performance Adaptation in Real-Time Intrusion Detection Systems. 252-273
Intrusion Detection Analysis
- Thomas Toth, Christopher Krügel:
Accurate Buffer Overflow Detection via Abstract Payload Execution. 274-291 - Jacob Zimmermann, Ludovic Mé, Christophe Bidan:
Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. 292-306 - Richard Lippmann, Seth E. Webster, Douglas Stetson:
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. 307-326
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.