Special Issue: Intrusion Detection (Sept. 1999)
Table of Contents
IN THIS ISSUE . . .
CONFERENCE REPORTS
Reports on the First Conference on Network Administration
Reports on the Workshop on Intrusion Detection and
Network Monitoring
FEATURES
Cisco Flow Logs and Intrusion Detection at the Ohio
State University
by Steve Romig, Mark Fullmer, and Suresh Ramachandran
Invisible Intruders: Rootkits in Practice
by David Brumley
Indicators of UNIX Host Compromise
by Paul C. Brutch, Tasneem G. Brutch, and Udo Pooch
A Hacker's Approach to ID
by Mudge
A Glimpse Into the Future of ID
by Tim Bass and Dave Gruber
On Reliability
by John Sellens
ANNOUNCEMENTS AND CALLS
3rd Annual Linux Showcase
3rd Large Installation System Administration of Windows
NT / 2000 Conference
9th USENIX Security Symposium