Amazon cover image
Image from Amazon.com

Recent Advances in Intrusion Detection [electronic resource] : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings /

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 2820Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003Edition: 1st ed. 2003Description: X, 242 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540452485
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 004.068 23
LOC classification:
  • QA76.9.M3
Online resources:
Contents:
Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
In: Springer Nature eBook
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in