TABLE OF CONTENTS

PART I     OVERVIEW

 

 

 

1

MANAGING THREATS TO WEB DATABASES AND CYBER SYSTEMS


Bhavani Thuraisingham ……………………………….……...................................................................

 3

     

2

INTRUSION DETECTION: A SURVEY

Aleksandar Lazarevic, Vipin Kumar, and Jaideep Srivastava………………………………………………

 

 19

 

 

 

PART II DATA MINING BASED ANALYSIS OF COMPUTER ATTACKS

 

 

 

3

LEARNING RULES AND CLUSTERS FOR ANOMALY DETECTION IN NETWORK TRAFFIC

Philip Chan, Matthew Mahoney, and Muhammad Arshad …................................................................

 81

 

 

 

4

STATISTICAL CAUSALITY ANALYSIS OF INFOSEC ALERT DATA

Wenke Lee, and Xinzhou Qin………………………….……......................................................................

 

101

 

 

 

5

MAKING SENSE OF NETWORK SECURITY DATA - USING AGGREGATION, ASSOCIATION DISCOVERY, AND CLUSTER ANALYSIS

Dave DeBarr ………………………………………………….......................................................................

129

 

 

 

 

 

 

PART III   TECHNIQUES FOR MANAGING CYBER VULNERABILITIES AND ALERTS

 

 

 

6

EARLY DETECTION OF ACTIVE INTERNET WORMS

Vincent H. Berk, George Cybenko, and Robert S. Gray ……...................................................................

 

 147

 

 

 

7

SENSOR FAMILIES FOR INTRUSION DETECTION INFRASTRUCTURES

Richard Kemmerer, and Giovanni Vigna …………………….....................................................................

 

 181

 

 

 

8

USER’S INTENT ENCAPSULATION - A NEW PROACTIVE INTRUSION ASSESSMENT PARADIGM

Shambhu Upadhyaya, Kevin Kwiat, Ramkumar Chinchani, and Kiran Mantha …………….................

 

 221

 

 

 

9

TOPOLOGICAL ANALYSIS OF NETWORK ATTACK VULNERABILITY

Sushil Jajodia, Steven Noel, and Brian O’Berry …………….......................................................................

 

 247

 

 

 

10

ANALYZING SURVIVABLE COMPUTATION IN CRITICAL INFRASTRUCTURES

Yvo Desmedt ………………………………………………….........................................................................

 

267

 

 

 

11

ALERT MANAGEMENT SYSTEMS - A QUICK INTRODUCTION

Robert Grossman ……………………………………………..........................................................................

 

 281

 

 

 

 

 

 

PART IV   CYBER FORENSICS

 

 

 

12

CYBER FORENSICS - MANAGING, MODELING AND MINING DATA FOR INVESTIGATION

Erin Kenneally, and Tony Fountain ………………………….....................................................................

295

 

 

 

13

CYBER FORENSICS – ISSUES AND APPROACHES

Jau-Hwang Wang ……………………………………………........................................................................

 

313