TABLE OF CONTENTS
PART I OVERVIEW |
|
|
|
|
|
1 |
MANAGING THREATS TO WEB DATABASES AND CYBER SYSTEMS
|
3 |
2 |
INTRUSION DETECTION: A SURVEY Aleksandar Lazarevic, Vipin Kumar, and Jaideep Srivastava |
19 |
|
|
|
PART II DATA MINING BASED ANALYSIS OF COMPUTER ATTACKS |
||
|
|
|
3 |
LEARNING RULES AND CLUSTERS FOR ANOMALY DETECTION IN NETWORK TRAFFIC Philip Chan, Matthew Mahoney, and Muhammad Arshad ................................................................ |
81 |
|
|
|
4 |
STATISTICAL CAUSALITY ANALYSIS OF INFOSEC ALERT DATA Wenke Lee, and Xinzhou Qin . ...................................................................... |
101 |
|
|
|
5 |
MAKING SENSE OF NETWORK SECURITY DATA - USING AGGREGATION, ASSOCIATION DISCOVERY, AND CLUSTER ANALYSIS Dave DeBarr ....................................................................... |
129 |
|
|
|
|
|
|
PART III TECHNIQUES FOR MANAGING CYBER VULNERABILITIES AND ALERTS |
||
|
|
|
6 |
EARLY DETECTION OF ACTIVE INTERNET WORMS Vincent H. Berk, George Cybenko, and Robert S. Gray ................................................................... |
147 |
|
|
|
7 |
SENSOR FAMILIES FOR INTRUSION DETECTION INFRASTRUCTURES Richard Kemmerer, and Giovanni Vigna ..................................................................... |
181 |
|
|
|
8 |
USERS INTENT ENCAPSULATION - A NEW PROACTIVE INTRUSION ASSESSMENT PARADIGM Shambhu Upadhyaya, Kevin Kwiat, Ramkumar Chinchani, and Kiran Mantha ................. |
221 |
|
|
|
9 |
TOPOLOGICAL ANALYSIS OF NETWORK ATTACK VULNERABILITY Sushil Jajodia, Steven Noel, and Brian OBerry ....................................................................... |
247 |
|
|
|
10 |
ANALYZING SURVIVABLE COMPUTATION IN CRITICAL INFRASTRUCTURES Yvo Desmedt ......................................................................... |
267 |
|
|
|
11 |
ALERT MANAGEMENT SYSTEMS - A QUICK INTRODUCTION Robert Grossman .......................................................................... |
281 |
|
|
|
|
|
|
PART IV CYBER FORENSICS |
||
|
|
|
12 |
CYBER FORENSICS - MANAGING, MODELING AND MINING DATA FOR INVESTIGATION Erin Kenneally, and Tony Fountain ..................................................................... |
295 |
|
|
|
13 |
CYBER FORENSICS ISSUES AND APPROACHES Jau-Hwang Wang ........................................................................ |
313 |