Recent Advances in Intrusion Detection

7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15 - 17, 2004. Proceedings

  • Erland Jonsson
  • Alfonso Valdes
  • Magnus Almgren

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3224)

Table of contents

  1. Front Matter
  2. Modelling Process Behaviour

  3. Detecting Worms and Viruses

    1. David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian Grizzard, John Levine et al.
      Pages 39-58
    2. Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berger
      Pages 59-81
  4. Attack and Alert Analysis

  5. Practical Experience

    1. Brian Hernacki, Jeremy Bennett, Thomas Lofgren
      Pages 188-202
  6. Anomaly Detection

    1. Ke Wang, Salvatore J. Stolfo
      Pages 203-222
    2. Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato
      Pages 223-237
    3. Yinglian Xie, Hyang-Ah Kim, David R. O’Hallaron, Michael K. Reiter, Hui Zhang
      Pages 238-257
  7. Formal Analysis for Intrusion Detection

    1. Avrim Blum, Dawn Song, Shobha Venkataraman
      Pages 258-277
    2. Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl Levitt
      Pages 278-295
    3. Ashish Gehani, Gershon Kedem
      Pages 296-314
  8. Back Matter

About these proceedings

Introduction

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15–17, 2004. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial perspectives. We also encouraged discussions that - dressed issues that arise when studying intrusion detection, including infor- tion gathering and monitoring, from a wider perspective. Thus, we had sessions on detection of worms and viruses, attack analysis, and practical experience reports. The RAID 2004 Program Committee received 118 paper submissions from all over the world. All submissions were carefully reviewed by several members of the Program Committee and selection was made on the basis of scienti?c novelty, importance to the ?eld, and technical quality. Final selection took place at a meeting held May 24 in Paris, France. Fourteen papers and two practical experience reports were selected for presentation and publication in the conf- ence proceedings. In addition, a number of papers describing work in progress were selected for presentation at the symposium. The keynote addresswas given by Bruce Schneier of Counterpane Systems. H? akan Kvarnstrom ¨ of TeliaSonera gave an invited talk on the topic “Fighting Fraud in Telecom Environments. ” A successful symposium is the result of the joint e?ort of many people.

Keywords

Information Internet Monitor RAID Routing anomality detection audit control cryptrographic attacks intrusion detection intrusion prevention log-data analysis network intrusion network security privacy security

Editors and affiliations

  • Erland Jonsson
    • 1
  • Alfonso Valdes
    • 2
  • Magnus Almgren
    • 1
  1. 1.Department of Computer Science and EngineeringChalmers University of TechnologyGöteborgSweden
  2. 2.SRI InternationalMenlo ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b100714
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-23123-3
  • Online ISBN 978-3-540-30143-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book