rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540000204

Recent Advances in Intrusion Detection: 5th International Symposium, Raid 2002, Zurich, Switzerland, October 16-18,2002 : Proceedings

by ; ; ; ; ;
  • ISBN13:

    9783540000204

  • ISBN10:

    3540000208

  • Format: Paperback
  • Copyright: 2002-11-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $109.00 Save up to $89.20
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book constitutes the refereed proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, RAID 2002, held in Zurich, Switzerland, in October 2002. The 16 revised full papers presented were carefully reviewed and selected from a total of 81 submissions. The papers are organized in topical sections on stepping stone detection, anomality detection, correlation, legal aspects and intrusion tolerance, assessment of intrusion detection systems, adaptive intrusion detection systems, intrusion detection analysis.

Table of Contents

Detecting Long Connection Chains of Interactive Terminal Sessionsp. 1
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delayp. 17
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accessesp. 36
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploitsp. 54
Analyzing Intensive Intrusion Alerts via Correlationp. 74
A Mission-Impact-Based Approach to INFOSEC Alarm Correlationp. 95
M2D2: A Formal Data Model for IDS Alert Correlationp. 115
Development of a Legal Framework for Intrusion Detectionp. 138
Learning Unknown Attacks - A Startp. 158
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systemsp. 177
A Stochastic Model for Intrusionsp. 199
Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Toolp. 219
Capacity Verification for High Speed Network Intrusion Detection Systemsp. 239
Performance Adaptation in Real-Time Intrusion Detection Systemsp. 252
Accurate Buffer Overflow Detection via Abstract Payload Executionp. 274
Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Levelp. 292
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detectionp. 307
Author Indexp. 327
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program