Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection, RAID 2003, held in Pittsburgh, PA, USA in September 2003. The 13 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on network infrastructure, anomaly detection, modeling and specification, and IDS sensors.
This book constitutes the refereed proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection, RAID 2003, held in Pittsburgh, PA, USA in September 2003. The 13 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on network infrastructure, anomaly detection, modeling and specification, and IDS sensors.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Giovanni Vigna, University of California, Santa Barbara, CA, USA / Erland Jonsson, Chalmers University of Technology, Goteborg, Sweden / Christopher Kruegel, University of California, Santa Barbara, CA, USA
Inhaltsangabe
Network Infrastructure.- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller.- Topology-Based Detection of Anomalous BGP Messages.- Anomaly Detection I.- Detecting Anomalous Network Traffic with Self-organizing Maps.- An Approach for Detecting Self-propagating Email Using Anomaly Detection.- Correlation.- Statistical Causality Analysis of INFOSEC Alert Data.- Correlation of Intrusion Symptoms: An Application of Chronicles.- Modeling and Specification.- Modeling Computer Attacks: An Ontology for Intrusion Detection.- Using Specification-Based Intrusion Detection for Automated Response.- IDS Sensors.- Characterizing the Performance of Network Intrusion Detection Sensors.- Using Decision Trees to Improve Signature-Based Intrusion Detection.- Ambiguity Resolution via Passive OS Fingerprinting.- Anomaly Detection II.- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems.- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
Network Infrastructure.- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller.- Topology-Based Detection of Anomalous BGP Messages.- Anomaly Detection I.- Detecting Anomalous Network Traffic with Self-organizing Maps.- An Approach for Detecting Self-propagating Email Using Anomaly Detection.- Correlation.- Statistical Causality Analysis of INFOSEC Alert Data.- Correlation of Intrusion Symptoms: An Application of Chronicles.- Modeling and Specification.- Modeling Computer Attacks: An Ontology for Intrusion Detection.- Using Specification-Based Intrusion Detection for Automated Response.- IDS Sensors.- Characterizing the Performance of Network Intrusion Detection Sensors.- Using Decision Trees to Improve Signature-Based Intrusion Detection.- Ambiguity Resolution via Passive OS Fingerprinting.- Anomaly Detection II.- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems.- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826