E-Book, Englisch, Band 2212, 210 Seiten, eBook
4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001 Proceedings
E-Book, Englisch, Band 2212, 210 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-45474-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Modeling Attacks.- From Declarative Signatures to Misuse IDS.- Logging and IDS Integration.- Application-Integrated Data Collection for Security Monitoring.- Interfacing Trusted Applications with Intrusion Detection Systems.- IDS Cooperation.- Probabilistic Alert Correlation.- Designing a Web of Highly-Configurable Intrusion Detection Sensors.- Aggregation and Correlation of Intrusion-Detection Alerts.- Anomaly Detection.- Accurately Detecting Source Code of Attacks That Increase Privilege.- CDIS: Towards a Computer Immune System for Detecting Network Intrusions.- Intrusion Tolerance.- Autonomic Response to Distributed Denial of Service Attacks.- Legal Aspects.- The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information.- Specification-Based IDS.- Experiences with Specification-Based Intrusion Detection.- System Health and Intrusion Monitoring Using a Hierarchy of Constraints.