Projects Papers Presentations People Links Contact
 
UVA CS Dept.

  UVA

  Email Professor Jones
Intrusion Detection Research main page Intrusion Detection Research main page
Presentations


Application Intrusion Detection

Application Intrusion Detection
Introduction
State of Practice
OS IDS - the two Approaches
OS IDS - the two Approaches
OS IDS -- a Particular Problem
An OS IDS is inherently limited by the semantics of the OS
A Complementary Approach
App IDS -- What's Possible?
App IDS -- Guiding Questions
Case Studies
Electronic Toll Collection (ETC)
ETC - Hierarchy
Need Analysis Technique
ETC - One Approach
Threat Categories
ETC - Appl'n Specific Intrusions
ETC Intrusion - Steal Service
Health Record Management (HRM)
HRM - App'n Specific Intrusions
HRM - Patient Harm Intrusion
Relate OS IDS to App IDS
Relate OS IDS to App IDS (cont'd)
Conclusion -- App IDS
Conclusion -- Next
Conclusion -- Next (cont)


Last Modified: September 1, 1999