Table of contents for EC2ND 2005 : proceedings of the First European Conference on Computer Network Defence, School of Computing, University of Glamorgan, Wales, UK / Andrew Blyth (ed.).


Bibliographic record and links to related information available from the Library of Congress catalog
Note: Electronic data is machine generated. May be incomplete or contain other coding.


Counter
Section I: Network Defence
Network Penetration Testing
iwen He and Nikolai Bode                                      3
Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding
oS Attacks
armo M61s                                                     13
pam Honey Pot Research
lam Meany                                                     23
Privacy protection mechanism in grid environment
ing Chu Li, Hongyan Yao, Cheng Guo, Na Zhang                  33
low Label Filtering Feasibility
)a McGann and David Malone                                   41
The Representation and use of Relation Information for the Detection of
Threats by Security Information Management Systems
yrl Onwubiko, Andrew P. Lenaghan, Luke Hebbes and Ron R. Malyan__  51
Stelligent real-time reactive Network Management
Abhishek Jain, Guillaume Andreys and G. Sivakumar             61
Scurity in Passive Optical Network via Wavelength Hopping and Codes
ccling techniques
alid Shawbaki                                                73
A Model of Deploying Deception in a Computer Network Operations (CNO)
Environment
Zar Kazmi and Stilianos Vidalis                              83
Sction II: Wireless & Ad Hoc Network Security
Taxonomy of Attacks on Wireless Sensor Networks
ng Han, Elizabeth Chang, Li Gao, and Tharam Dillon ______    97
A Lightweight Identity Authentication Mechanism for Self-Organizing Wireless
Snsor Networks
Son Heo and Choong Seon Hong                                  107
Sdelling the Spread of Computer Worms in Vehicular Ad-Hoc Networks
ziar Nekovee                                                  115
Why Attackers seek wireless networks in Perth, Western Australia for easy
ta ets
Sen Yek                                                       125
Section III: Network Protocol Analysis & Cryptographic
Applications
Attack on Undeniable Partially Blind Signatures
Song Han, Elizabeth Chang and Jie Wang                        139
Evolutionary Approach in the Security Protocols Design
Pavel Ocenasek                                                147
Improvement of Adaptive Threshold RSA
Feiyu Lei, Wen Chen and Kefei Chen                            157
Section IV: Intrusion Detection & Prevention
A Log-Based Mining System for Network Node Correlation
Yongzheng Zhang, Binxing Fang, Yue Chi and Xiaochun Yun       167
Exploring Vulnerabilities of Agent-based IDS: The Need for Agent Self-
defence
Eni E. Oyegoke, Theodore Tryfonas and Andrew J Blyth_          177
Detecting and Classifying Attacks in Computer Networks Using Feed-
Forward and Elman Neural Networks
V. Alarcon-Aquino, J. A. Mejia-Sanchez, R. Rosas-Romero and
J. F. Ramirez-Cruz                                            187
Data Authentication and Trust Within Distributed Intrusion Detection System
Inter-Component Communications
John Haggerty, Qi Shi, Paul Fergus and Madjid Merabti         197
Design and Implementation of a Fast String Matcher Utilizing Content
Addressable Memory
Mohamed Azab, Mohamed Rizk and Mohamad Abou-EI-Nasr           207
Zero hour outbreak prevention using distributed traffic anomaly detection
Andrds Korn and G6bor Feh6r                                   219
Mediating Hosts' malicious Character
Mohammed Chihoub                                              229
Masquerade Detection by Using Activity Pattems
B.M. Reshmi and S.S. Manvi                                   241
Section V: Software for Security in Networked Environments
A Flexible, Open Source Software Architecture for Network-Based Forensic
Computing & Intelligence Gathering
Christopher Meyler and lain Sutherland                        253
Protecting Distributed Object Applications from Corruption of Class
Bytecodes on Client Side
Julian L. Rrushi                                              263
Modelling and Construction of Web Services Security
Li-Guo Wang and Lyndon Lee                                  273
Normalising Events into Incidents Using Unified Intrusion Detection-Related
Data
Nikolaos Avourdiadis and Andrew Blyth___                    283



Library of Congress subject headings for this publication: Computer networks Security measures Congresses