Recent advances in intrusion detection : 10th international symposium, RAID 2007, Gold Goast , Australia, September 5-7, 2007 : proceedings / Christopher Kruegel, Richard Lippmann, Andrew Clark (eds.).

"This book constitutes the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection, RAID 2007, held in Gold Coast, Australia in September 2007.; The 17 revised full papers presented were carefully reviewed and selected from 101 submissions. The papers...

Full description

Saved in:
Bibliographic Details
Main Authors: Clark, Andrew, 1971- (Author), Kruegel, Christopher, 1976- (Author), Lippmann, Richard (Author)
Corporate Author: RAID (Symposium) Gold Coast, Qld.)
Format: Ebook
Language:English
Published: Berlin ; New York, NY : Springer-Verlag, [2007]
Series:Lecture notes in computer science ; 4637.
LNCS sublibrary. Security and cryptology
Subjects:
Online Access:Springer eBooks
Table of contents
Table of Contents:
  • Host-Based Intrusion Detection:
  • Exploiting Execution Context for the Detection of Anomalous System Calls / Darren Mutz, William Robertson, Giovanni Vigna, Richard Kemmerer
  • Understanding Precision in Host Based Intrusion Detection / Monirul Sharif, Kapil Singh, Jonathon Giffin, Wenke Lee
  • Anomaly-Based Intrusion Detection:
  • Comparing Anomaly Detection Techniques for HTTP / Kenneth L. Ingham, Hajime Inoue
  • Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications / Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna
  • Network-Based Intrusion Detection and Response:
  • Emulation-Based Detection of Non-self-contained Polymorphic Shellcode / Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
  • The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware / Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney
  • Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks / Shiau-Huey Wang, Chinyang Henry Tseng, Karl Levitt, Matthew Bishop
  • Insider Detection and Alert Correlation:
  • elicit: A System for Detecting Insiders Who Violate Need-to-Know / Marcus A. Maloof, Gregory D. Stephens
  • On the Use of Different Statistical Tests for Alert Correlation – Short Paper / Federico Maggi, Stefano Zanero
  • Malicious Code Analysis:
  • Automated Classification and Analysis of Internet Malware / Michael Bailey, Jon Oberheide, Jon Andersen, Z. Morley Mao, Farnam Jahanian, Jose Nazario
  • “Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots / Xuxian Jiang, Xinyuan Wang
  • A Forced Sampled Execution Approach to Kernel Rootkit Identification / Jeffrey Wilhelm, Tzi-cker Chiueh
  • Evasion:
  • Advanced Allergy Attacks: Does a Corpus Really Help? / Simon P. Chung, Aloysius K. Mok
  • Alert Verification Evasion Through Server Response Forging / Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers
  • Malicious Code Defense:
  • Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs / M. Patrick Collins, Michael K. Reiter
  • SpyShield: Preserving Privacy from Spy Add-Ons / Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
  • Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems / John R. Lange, Peter A. Dinda, Fabián E. Bustamante.
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.