CMAD IV Slides
Table of Contents
Download the entire Slide Presentations of CMAD IV in PDF Format (2,786 KB).

Session 1: Policy-Driven Intrusion Detection and the Inside Threat

Misuse 
Jim Anderson, James Anderson Co.

Auditing for Database Systems and Applications
Marvin Schaefer, Arca Systems, Inc.

Concept Learning and Searching Over Networks Using Java Agents for Meta-learning
Salvatore J. Stolfo, Columbia University

Distributed Security Policy Database
Dai Vu, Lockheed Martin

Misuse Detection in Database Systems
Raymond Yip, University of California, Davis

Detecting Insider Attacks
E. Eugene Schultz, SRI Consulting


Session 2: Intrusion Detection technology for Small Scale Systems

Haystack Labs, Inc. Product Lines
Steve Smaha, Haystack Labs, Inc.

A NADIR Progress Report
Kathleen A. Jackson, Computing, Information, and Communications (CIC) Division

Immunology and Computer Security
Steven Hofmeyr, University of New Mexico

Lincoln Laboratory Intrusion Detection Research
Richard P. Lippman, MIT Lincoln Laboratory


Session 3: New Attacks and New Twists on Existing Attacks

ATM Firewall Technology: Lessons for Intrusion Detection
Christoph L. Schuba, Purdue University

Denial-of-Service Attacks
Simson Garfinkle

Attacks on Cellular Systems [Paper]
Hai-Ping Ko, GTE Laboratories Incorporated


Session 4: Intrusion Detection in the Large

Miscellaneous Papers from Participants
Internetwork Security Monitor: An Intrusion-Detection System for Large-Scale Networks
L. T. Heberlein, B. Mukherjee, K. N. Levitt, UC Davis

Analysis and Response for Intrusion Detection in Large Networks
Peter G. Neumann, Phillip A. Porras, Alfonso Valdes, SRI International
 

Distributed Detection of Distributed Attacks
Douglas B. Moran, SRI International

Scalable Intrusion Detection for the Emerging Network Infrastructure
Y. Frank Jou, MCNC

Autonomous Agents
Mark Crosbie, Hewlett-Packard/COAST

Network Management and Operations
JF Mergen, BBN


Session 5: New Environments for Intrusion Detection

Thoughts About Susceptibility to Data Driven Attacks
Marvin Schaefer, Arca Systems, Inc.

The Need for a Standard for the Format and Content of Audit Trails
Katherine Price, Purdue University

Auditing on Sidewinder
Tom Haigh, Secure Computing Corp.

Information Security and the Electric Power Industry
Ab Kader, EPRI


Session 6: Tools for Investigative support

Computer Based Forensics – A Case Study – U. S. Support to the U. N.
Capt. Kevin J. Ziese, AF Information Warfare Center

Interactive Intrusion Detection
Mike Neuman, En Garde Systems, Inc.


Session 7: New Ideas

CMAD IV Summary
Mark Schneider, Office of INFOSEC Research

Some Thoughts
Gene Spafford, Purdue University

New Ideas: Borrowing from other Areas
Mary Ellen Zurko, Open Group Research Institute