Logging |
Better Logging through Formality / Chapman Flack ; Mikhail J. Atallah |
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions / Josué Kuri ; Gonzalo Navarro ; Ludovic Mé ; Laurent Heye |
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection / Joachim Biskup ; Ulrich Flegel |
Data Mining |
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions / Wenke Lee ; Rahul A. Nimbalkar ; Kam K. Yee ; Sunil B. Patil ; Pragneshkumar H. Desai ; Thuan T. Tran ; Salvatore J. Stolfo |
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report / Christoph Michael ; Anup Ghosh |
Modeling Process Behavior |
Adaptive, Model-Based Monitoring for Cyber Attack Detection / Alfonso Valdes ; Keith Skinner |
A Real-Time Intrusion Detection System Based on Learning Program Behavior / Anup K. Ghosh ; Michael Schatz |
Intrusion Detection Using Variable-Length Audit Trail Patterns / Andreas Wespi ; Marc Dacier ; Hervé Debar |
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects / Zakia Marrakchi ; Bernard Vivinis ; Benjamin Morin |
IDS Evaluation |
The 1998 Lincoln Laboratory IDS Evaluation (A Critique) / John McHugh |
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation / Richard Lippmann ; Joshua W. Haines ; David J. Fried ; Jonathan Korba ; Kumar Das |
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems / Dominique Alessandri |
Modeling |
LAMBDA: A Language to Model a Database for Detection of Attacks / Frederic Cuppens ; Rodolphe Ortalo |
Target Naming and Service Apoptosis / James Riordan |
Author Index |
Logging |
Better Logging through Formality / Chapman Flack ; Mikhail J. Atallah |
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions / Josué Kuri ; Gonzalo Navarro ; Ludovic Mé ; Laurent Heye |
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection / Joachim Biskup ; Ulrich Flegel |
Data Mining |
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions / Wenke Lee ; Rahul A. Nimbalkar ; Kam K. Yee ; Sunil B. Patil ; Pragneshkumar H. Desai ; Thuan T. Tran ; Salvatore J. Stolfo |