Christopher Kruegel / Richard Lippmann / Andrew Clark (eds.)10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings
Recent Advances in Intrusion Detection
10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings
Herausgegeben:Kruegel, Christopher; Lippmann, Richard; Clark, Andrew
Christopher Kruegel / Richard Lippmann / Andrew Clark (eds.)10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings
Recent Advances in Intrusion Detection
10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings
Herausgegeben:Kruegel, Christopher; Lippmann, Richard; Clark, Andrew
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. The 17 full papers were carefully reviewed. Each one represents an important contribution to the study of intrusion detection. Papers cover anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.
Andere Kunden interessierten sich auch für
- Diego Zamboni / Christopher Kruegel (eds.)Recent Advances in Intrusion Detection43,99 €
- Erland Jonsson / Alfonso Valdes / Magnus Almgren (eds.)Recent Advances in Intrusion Detection42,99 €
- Giovanni Vigna / Erland Jonsson / Christopher Kruegel (eds.)Recent Advances in Intrusion Detection42,99 €
- Recent Advances in Intrusion Detection42,99 €
- Bernhard Hämmerli (Volume ed.) / Robin SommerDetection of Intrusions and Malware, and Vulnerability Assessment41,99 €
- Klaus Julisch / Christopher Kruegel (eds.)Detection of Intrusions and Malware, and Vulnerability Assessment42,99 €
- Wenke Lee / Ludovic Me / Andreas Wespi (eds.)Recent Advances in Intrusion Detection42,99 €
-
-
-
Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. The 17 full papers were carefully reviewed. Each one represents an important contribution to the study of intrusion detection. Papers cover anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 4637
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12110704, 978-3-540-74319-4
- 2007
- Seitenzahl: 352
- Erscheinungstermin: 14. August 2007
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 540g
- ISBN-13: 9783540743194
- ISBN-10: 3540743197
- Artikelnr.: 23034089
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 4637
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12110704, 978-3-540-74319-4
- 2007
- Seitenzahl: 352
- Erscheinungstermin: 14. August 2007
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 540g
- ISBN-13: 9783540743194
- ISBN-10: 3540743197
- Artikelnr.: 23034089
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Host-Based Intrusion Detection.- Exploiting Execution Context for the Detection of Anomalous System Calls.- Understanding Precision in Host Based Intrusion Detection.- Anomaly-Based Intrusion Detection.- Comparing Anomaly Detection Techniques for HTTP.- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.- Network-Based Intrusion Detection and Response.- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode.- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks.- Insider Detection and Alert Correlation.- elicit: A System for Detecting Insiders Who Violate Need-to-Know.- On the Use of Different Statistical Tests for Alert Correlation - Short Paper.- Malicious Code Analysis.- Automated Classification and Analysis of Internet Malware.- "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots.- A Forced Sampled Execution Approach to Kernel Rootkit Identification.- Evasion.- Advanced Allergy Attacks: Does a Corpus Really Help?.- Alert Verification Evasion Through Server Response Forging.- Malicious Code Defense.- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs.- SpyShield: Preserving Privacy from Spy Add-Ons.- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.
Host-Based Intrusion Detection.- Exploiting Execution Context for the Detection of Anomalous System Calls.- Understanding Precision in Host Based Intrusion Detection.- Anomaly-Based Intrusion Detection.- Comparing Anomaly Detection Techniques for HTTP.- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.- Network-Based Intrusion Detection and Response.- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode.- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks.- Insider Detection and Alert Correlation.- elicit: A System for Detecting Insiders Who Violate Need-to-Know.- On the Use of Different Statistical Tests for Alert Correlation - Short Paper.- Malicious Code Analysis.- Automated Classification and Analysis of Internet Malware.- "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots.- A Forced Sampled Execution Approach to Kernel Rootkit Identification.- Evasion.- Advanced Allergy Attacks: Does a Corpus Really Help?.- Alert Verification Evasion Through Server Response Forging.- Malicious Code Defense.- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs.- SpyShield: Preserving Privacy from Spy Add-Ons.- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.