The Community for Technology Leaders
DARPA Information Survivability Conference and Exposition, (2001)
Anaheim, California
June 12, 2001 to June 14, 2001
ISBN: 0-7695-1212-7
TABLE OF CONTENTS
Detection & Response

Statistical Process Control for Computer Intrusion Detection (Abstract)

Xiangyang Li , Arizona State University
Syed Masum Emran , Arizona State University
Qiang Chen , Arizona State University
Nong Ye , Arizona State University
pp. 0003

Attack Detection in Large Net (Abstract)

Jack May , TRW Inc.
Jim Peterson , TRW Inc.
John Bauman , TRW Inc.
pp. 0015

GlobalGuard: Creating the IETF-IDWG Intrusion Alert Protocol (IAP) (Abstract)

B. Feinstein , Harvey Mudd College
K. Levitt , University of California, Davis
A. Walther , The Aerospace Corporation
T. Buchheim , Harvey Mudd College
M. Erlinger , Harvey Mudd College
J. Betser , The Aerospace Corporation
G. Matthews , Harvey Mudd College
R. Pollock , Harvey Mudd College
pp. 0022

Extending the DARPA Off-Line Intrusion Detection Evaluations (Abstract)

Robert K. Cunningham , Massachusetts Institute of Techonology
Joshua W. Haines , Massachusetts Institute of Techonology
Richard P. Lippmann , Massachusetts Institute of Techonology
Lee M. Rossey , Massachusetts Institute of Techonology
pp. 0035

Cooperative Intrusion Traceback and Response Architecture (CITRA) (Abstract)

Kelly Djahandari , NAI Labs, Network Associates
Dan Schnackenberg , The Boeing Company, Phantom Works
Randall Smith , The Boeing Company, Phantom Works
Harley Holliday , The Boeing Company, Phantom Works
Dan Sterne , NAI Labs, Network Associates
pp. 0056

A Hybrid Approach to the Profile Creation and Intrusion Detection (Abstract)

John Surdu , United States Military Academy
Jack Marin , United States Military Academy
Daniel Ragsdale , United States Military Academy
pp. 0069

SARA: Survivable Autonomic Response Architecture (Abstract)

Daniel J. Van Hook , Massachusetts Institute of Technology
Scott M. Lewandowski , Massachusetts Institute of Technology
Joshua W. Haines , Massachusetts Institute of Technology
Lee M. Rossey , Massachusetts Institute of Technology
Gerald C. O'Leary , Massachusetts Institute of Technology
pp. 0077

Real Time Data Mining-Based Intrusion Detection (Abstract)

Shlomo Hershkop , Columbia University
Matthew Miller , Columbia University
Philip K. Chan , Florida Institute of Technology
Salvatore J. Stolfo , Columbia University
Wenke Lee , North Carolina State University
Wei Fan , IBM T.J.Watson Research Center
Junxin Zhang , Columbia University
Eleazar Eskin , Columbia University
pp. 0089
Integration & Experimentation

Experimenting with Security Policy (Abstract)

Richard E. Smith , Secure Computing Corporation
pp. 0116

Experimentation in the IA P (Abstract)

Kenneth Theriault , BBN Technologies, A Verizon Company
John Lowry , BBN Technologies, A Verizon Company
pp. 0134

Issues in Human Interaction for Cyber Command and Control (Abstract)

Helene Henri , BBN Technologies, a Verizon company
David Levin , BBN Technologies, a Verizon company
Yvette J. Tenney , BBN Technologies, a Verizon company
pp. 0141

Architecture for Cyber Command and Control: Experiences and Future Directions (Abstract)

David Levin , BBN Technologies, LLC, a part of Verizon
Daniel F. Vukelich , BBN Technologies, LLC, a part of Verizon
John Lowry , BBN Technologies, LLC, a part of Verizon
pp. 0155

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes (Abstract)

Eleazar Eskin , Columbia University
Salvatore J. Stolfo , Columbia University
Wenke Lee , North Carolina State University
pp. 0165

Dynamic Approaches to Thwart Adversary Intelligence Gathering (Abstract)

Russ Fink , BBN Technologies, A Verizon Company
Dorene Kewley , BBN Technologies, A Verizon Company
John Lowry , BBN Technologies, A Verizon Company
Mike Dean , BBN Technologies, A Verizon Company
pp. 0176
Policy
Prevention

The Releasable Data Products Framework (Abstract)

Charles N. Payne Jr , Secure Computing Corporation
Richard E. Smith , Secure Computing Corporation
pp. 0203

Public Key Validation for the DNS Security Extensions (Abstract)

Allison Mankin , USC/ISI
Russ Mundy , Network Associates, Inc.
Daniel Massey , USC/ISI
Ed Lewis , Network Associates, Inc.
pp. 0227

Dynamic VPN Communities: Implementation and Experience (Abstract)

Daniel Sterne , NAI Labs, Network Associates
Darrell Kindred , NAI Labs, Network Associates
pp. 0254

Security at the Network Edge: A Distributed Firewall Architecture (Abstract)

Tom Markham , Secure Computing Corporation
Charlie Payne , Secure Computing Corporation
pp. 0279

Tools for Information Assurance Arguments (Abstract)

Bruce Montrose , Naval Research Laboratory
Judith N. Froscher , Naval Research Laboratory
Joon S. Park , Naval Research Laboratory
pp. 0287
Cyber Panel Program

Agile Monitoring for Cyber Defense (Abstract)

Peter Szolovits , Massachusetts Institute of Technology
William Long , Massachusetts Institute of Technology
Isaac Kohane , Childrens' Hospital
Howard Shrobe , Massachusetts Institute of Technology
Jon Doyle , Massachusetts Institute of Technology
pp. 0318

Information Modeling for Intrusion Report Aggregation (Abstract)

Robert L. Carter , Honeywell Laboratories
Christopher W. Geib , Honeywell Laboratories
Walter Heimerdinger , Honeywell Laboratories
Vicraj Thomas , Honeywell Laboratories
Robert P. Goldman , Honeywell Laboratories
Steven A. Harp , Honeywell Laboratories
pp. 0329

The Information Battle Space Preparation Experiment (Abstract)

Laura S. Tinnel , Teknowledge Corporation
Roderick A. Moore , Zel Technologies, LLC
Dorene L. Kewley , BBN Technologies
Raymond C. Parks , Sandia National Laboratory
J. Kendree Williams , Zel Technologies, LLC
Denise Snyder , BBN Technologies
pp. 0352

Viewing IDS Alerts: Lessons from SnortSnarf (Abstract)

James A. Hoagland , Silicon Defense
Stuart Staniford , Silicon Defense
pp. 0374

Security Situation Assessment and Response Evaluation (SSARE) (Abstract)

Suzanne Mahoney , Information Extraction & Transport, Inc.
Masami Takikawa , Information Extraction & Transport, Inc.
Daniel Upper , Information Extraction & Transport, Inc.
Julie Fitzgerald , Information Extraction & Transport, Inc.
Bruce D 'Ambrosio , Information Extraction & Transport, Inc.
pp. 0387
89 ms
(Ver 3.3 (11022016))