TY - BOOK AU - Debar,Hervé AU - Mé,Ludovic AU - Wu,S.Felix ED - RAID 2000 TI - Recent advances in intrusion detection: third international workshop, RAID 2000, Toulouse, France, October 2-4, 2000 : proceedings T2 - Lecture notes in computer science SN - 9783540399452 AV - QA76.9.A25 R34 2000 U1 - 005.8 21 PY - 2000/// CY - Berlin, New York PB - Springer KW - Intrusion detection systems (Computer security) KW - Congresses KW - Systèmes de détection d'intrusion (Sécurité informatique) KW - Congrès KW - fast KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes bibliographical references and index; Using finite automata to mine execution data for intrusion detection / Christoph Michael and Anup Ghosh -- Adaptive, model-based monitoring for cyber attack detection / Alfonso Valdes and Keith Skinner -- A real-time intrusion detection system based on learning program behavior / Anup K. Ghosh, Christoph Michael, and Michael Schatz -- Intrusion detection using variable-length audit trail patterns / Andreas Wespi, Marc Dacier, and Herve Debar -- Flexible intrusion detection using variable-length behavior modeling in distributed environment: application to CORBA objects / Zakia Marrakchi [and others] -- The 1998 Lincoln Laboratory IDS evaluation / John McHugh -- Analysis and results of the 1999 DARPA off-line intrusion detection evaluation / Richard Lippmann [and others] -- Using rule-based activity descriptions to evaluate intrusion-detection systems / Dominique Alessandri -- LAMBDA: a language to model a database for detection of attacks / Frederic Cuppens and Rodolphe Ortalo -- Target naming and service apoptosis / James Riordan and Dominique Alessandri; Electronic resource (access conditions) N2 - This book constitutes the refereed proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, RAID 2000, held in Toulouse, France in October 2000. The 14 revised full papers presented were carefully reviewed and selected from a total of 26 papers and 30 extended abstracts submitted. The papers are organized in sections on logging, data mining, modeling process behaviour, IDS evaluation, and modeling UR - https://link.springer.com/10.1007/3-540-39945-3 ER -