A framework for the application of association rule mining in large intrusion detection infrastructures | p. 1 |
Behavioral distance measurement using hidden Markov models | p. 19 |
Automated discovery of mimicry attacks | p. 41 |
Allergy attack against automatic signature generation | p. 61 |
Paragraph : thwarting signature learning by training maliciously | p. 81 |
Anomaly detector performance evaluation using a parameterized environment | p. 106 |
Ranking attack graphs | p. 127 |
Using hidden Markov models to evaluate the risks of intrusions | p. 145 |
The Nepenthes platform : an efficient approach to collect Malware | p. 165 |
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots | p. 185 |
Fast and evasive attacks : highlighting the challenges ahead | p. 206 |
Anagram : a content anomaly detector resistant to mimicry attack | p. 226 |
DEMEM : distributed evidence-driven message exchange intrusion detection model for MANET | p. 249 |
Enhancing network intrusion detection with integrated sampling and filtering | p. 272 |
WIND : workload-aware INtrusion detection | p. 290 |
SafeCard : a gigabit IPS on the network card | p. 311 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.