rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540427025

Recent Advances in Intrusion Detection : 4th International Symposium, RAID 2001, Davis, CA, USA., October 10-12, 2001 Proceedings

by ; ;
  • ISBN13:

    9783540427025

  • ISBN10:

    3540427023

  • Format: Paperback
  • Copyright: 2001-10-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $79.20
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book provides a framework for analysing complex systems for which classical thermodynamics is often not applicable. Since the success of the activated process in 1970, diamond growth with simultaneous graphite etching under low pressure has often been regarded as a violation of the second law of thermodynamics. A series of nonequilibrium phase diagrams, which agree excellently with the activated diamond experiments, have been calculated by the author and his coworkers on the basis of reaction coupling. The book goes on to demonstrate how these lead to a complete new systematization of modern thermodynamics.

Table of Contents

Modeling Attacks
From Declarative Signatures to Misuse IDSp. 1
Logging and IDS Integration
Application-Integrated Data Collection for Security Monitoringp. 22
Interfacing Trusted Applications with Intrusion Detection Systemsp. 37
IDS Cooperation
Probabilistic Alert Correlationp. 54
Designing a Web of Highly-Configurable Intrusion Detection Sensorsp. 69
Aggregation and Correlation of Intrusion-Detection Alertsp. 85
Anomaly Detection
Accurately Detecting Source Code of Attacks That Increase Privilegep. 104
CDIS: Towards a Computer Immune System for Detecting Network Intrusionsp. 117
Intrusion Tolerance
Autonomic Response to Distributed Denial of Service Attacksp. 134
Legal Aspects
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Informationp. 150
Specification-Based IDS
Experiences with Specification-Based Intrusion Detectionp. 172
System Health and Intrusion Monitoring Using a Hierarchy of Constraintsp. 190
Author Indexp. 205
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program