Abstract
We try, in this panel, to give an overview of intrusion detection, and then propose some areas where work in database security and intrusion detection can and should overlap.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35508-5_22
Chapter PDF
Similar content being viewed by others
References
Chung, Gertz, and Levitt (1999). Misuse detection in database systems through user profiling. Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection.
Lee, W., Stolfo, S. J., and Mok, K. W. (1998). Mining audit data to build intrusion detection models. Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98) (eds. R. Agrawal, P. E. Stolorz and G. Piatetsky-Shapiro ), pp. 66–72.
Lin, T.Y. (1999). Discovering patterns in numerical sequences using rough set theory. Proceedings of the Third World Multi-conference on Systemics, Cybernetics and Informatics.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Ting, T.C., Huang, M.Y., Pitcock, D.S., Clifton, C., Lin, T.Y. (2000). Panel on Intrusion Detection. In: Atluri, V., Hale, J. (eds) Research Advances in Database and Information Systems Security. IFIP — The International Federation for Information Processing, vol 43. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35508-5_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-35508-5_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6411-6
Online ISBN: 978-0-387-35508-5
eBook Packages: Springer Book Archive