04520nam 22008175 450 99646606130331620200701020334.03-540-45248-610.1007/b13476(CKB)1000000000212185(SSID)ssj0000326133(PQKBManifestationID)11213125(PQKBTitleCode)TC0000326133(PQKBWorkID)10265256(PQKB)11533755(DE-He213)978-3-540-45248-5(MiAaPQ)EBC3087762(PPN)155204882(EXLCZ)99100000000021218520121227d2003 u| 0engurnn|008mamaatxtccrRecent Advances in Intrusion Detection[electronic resource] 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings /edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (X, 242 p.) Lecture Notes in Computer Science,0302-9743 ;2820Bibliographic Level Mode of Issuance: Monograph3-540-40878-9 Includes bibliographical references at the end of each chapters and index.Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.Lecture Notes in Computer Science,0302-9743 ;2820Management information systemsComputer scienceData encryption (Computer science)Computer communication systemsOperating systems (Computers)Computers and civilizationManagement of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Computer Science, generalhttps://scigraph.springernature.com/ontologies/product-market-codes/I00001Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management information systems.Computer science.Data encryption (Computer science).Computer communication systems.Operating systems (Computers).Computers and civilization.Management of Computing and Information Systems.Cryptology.Computer Communication Networks.Computer Science, general.Operating Systems.Computers and Society.005.8 Vigna Giovanniedthttp://id.loc.gov/vocabulary/relators/edtJonsson Erlandedthttp://id.loc.gov/vocabulary/relators/edtKruegel Christopheredthttp://id.loc.gov/vocabulary/relators/edtRAID 2003MiAaPQMiAaPQMiAaPQBOOK996466061303316Recent Advances in Intrusion Detection772673UNISA