Recent Advances in Intrusion Detection

Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings

  • Hervé Debar
  • Ludovic Mé
  • S. Felix Wu
Conference proceedings RAID 2000

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1907)

Table of contents

  1. Front Matter
    Pages I-X
  2. Logging

    1. Chapman Flack, Mikhail J. Atallah
      Pages 1-16
    2. Josué Kuri, Gonzalo Navarro, Ludovic Mé, Laurent Heye
      Pages 17-27
  3. Data Mining

    1. Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran et al.
      Pages 49-65
  4. Modeling Process Behavior

    1. Alfonso Valdes, Keith Skinner
      Pages 80-93
    2. Anup K. Ghosh, Christoph Michael, Michael Schatz
      Pages 93-109
    3. Andreas Wespi, Marc Dacier, Hervé Debar
      Pages 110-129
  5. IDS Evaluation

    1. John McHugh
      Pages 145-161
    2. Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das
      Pages 162-182
  6. Modeling

    1. Frédéric Cuppens, Rodolphe Ortalo
      Pages 197-216
    2. James Riordan, Dominique Alessandri
      Pages 217-225
  7. Back Matter
    Pages 227-227

About these proceedings

Introduction

Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.

Keywords

Audit Control Authentication Blu-ray Cryptoanalysis Cryptographic Attacks Data Mining Distributed Intrusion Execution Data Mining Intrusion Detection Loging Pattern Analysis Security privacy

Editors and affiliations

  • Hervé Debar
    • 1
  • Ludovic Mé
    • 2
  • S. Felix Wu
    • 3
  1. 1.France Télécom R & DCaenFrance
  2. 2.SUPELECCesson Sevigne CedexFrance
  3. 3.Department of Computer Science, 2063 Engineering IIUniversity of California at DavisDavisUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-39945-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-41085-0
  • Online ISBN 978-3-540-39945-2
  • Series Print ISSN 0302-9743
  • About this book