Detecting Long Connection Chains of Interactive Terminal Sessions | p. 1 |
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay | p. 17 |
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses | p. 36 |
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits | p. 54 |
Analyzing Intensive Intrusion Alerts via Correlation | p. 74 |
A Mission-Impact-Based Approach to INFOSEC Alarm Correlation | p. 95 |
M2D2: A Formal Data Model for IDS Alert Correlation | p. 115 |
Development of a Legal Framework for Intrusion Detection | p. 138 |
Learning Unknown Attacks - A Start | p. 158 |
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems | p. 177 |
A Stochastic Model for Intrusions | p. 199 |
Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool | p. 219 |
Capacity Verification for High Speed Network Intrusion Detection Systems | p. 239 |
Performance Adaptation in Real-Time Intrusion Detection Systems | p. 252 |
Accurate Buffer Overflow Detection via Abstract Payload Execution | p. 274 |
Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level | p. 292 |
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection | p. 307 |
Author Index | p. 327 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.