Marcus Tylutki, Karl Levitt (auth.), Giovanni Vigna, Christopher Kruegel, Erland Jonsson (eds.)3540408789, 9783540408789
The 13 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on network infrastructure, anomaly detection, modeling and specification, and IDS sensors.
Table of contents :
Front Matter….Pages –
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller….Pages 1-16
Topology-Based Detection of Anomalous BGP Messages….Pages 17-35
Detecting Anomalous Network Traffic with Self-organizing Maps….Pages 36-54
An Approach for Detecting Self-propagating Email Using Anomaly Detection….Pages 55-72
Statistical Causality Analysis of INFOSEC Alert Data….Pages 73-93
Correlation of Intrusion Symptoms: An Application of Chronicles….Pages 94-112
Modeling Computer Attacks: An Ontology for Intrusion Detection….Pages 113-135
Using Specification-Based Intrusion Detection for Automated Response….Pages 136-154
Characterizing the Performance of Network Intrusion Detection Sensors….Pages 155-172
Using Decision Trees to Improve Signature-Based Intrusion Detection….Pages 173-191
Ambiguity Resolution via Passive OS Fingerprinting….Pages 192-206
Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems….Pages 207-219
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection….Pages 220-237
Back Matter….Pages –
Reviews
There are no reviews yet.