Journal of Information Assurance and Security

Volume 4, Issue 3, June 2009


Special Issue on Intrusion and Malware Detection (Editorial)

 

Guest editors: Johnson Thomas, OSU, USA and Wei Yan, Trend Micro Inc., USA


  Page no.


A Genetic Algorithm-based Solution for Intrusion Detection
192
 Zorana Banković, Jos� M. Moya, �lvaro Araujo, Slobodan Bojanić and Octavio Nieto-Taladriz

 

 
 
Queuing theory based models for studying intrusion evolution and elimination in computer networks 200
 P. Kammas, T. Komninos, Y.C. Stamatiou

 

 
 
 An Intrusion Detection System based on Hierarchical Self-Organization 209

 Esteban J. Palomo, Enrique Dom�nguez, Rafael M. Luque and Jos� Mu�oz 

 

 
   
Ensemble Classifiers for Network Intrusion Detection System 217
 Anazida Zainal, Mohd Aizaini Maarof and Siti Mariyam Shamsuddin

 

 Applying Intrusion Detection to Automotive IT � Early Insights and Remaining Challenges 226

 Tobias Hoppe, Stefan Kiltz and Jana Dittmann 

 

 
   
A System Architecture for Operator-Centric and Adaptive Intrusion Detection 236
 Ulf E. Larson, Stefan Lindskog, Dennis K. Nilsson, and Erland Jonsson

 


Using Qualia and Hierarchical Models in Malware Detection
247
 Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, and Steven K. Rogers

 

   
ACMF: Framework for modeling attack based on Capability Model
 Navneet Kumar Pandey, S. K. Gupta and Shaveta Leekha

256

 
 
Analysis of User Command Behavior and Masquerade Detection

265

 Shou-Hsuan Stephen Huang and Han-Ching Wu

 

 
   
A Kernel Data Analysis Method  for Detecting Flood Attacks (brief paper)

274

 Jaeik Cho, Manhyun Chung and Jongsub Moon

 

 
   
A security policy and Network Cartography based Intrusion Detection and Prevention Systems

279

 Sourour Meharouech, Adel Bouhoula, Tarek Abbes

 

 

 
 
Detection of Email Worm-Infected Machines on the Local Name Servers Using Time Series Analysis 292
 Nikolaos Chatzis and Radu Popescu-Zeletin

 

 

Copyright � 2005 - 2009, Dynamic Publishers Inc., USA



No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.