Amazon cover image
Image from Amazon.com

Recent advances in intrusion detection : 10th international symposium, RAID 2007, Gold Goast [i.e. Coast], Australia, September 5-7, 2007 : proceedings / Christopher Kruegel, Richard Lippmann, Andrew Clark (eds.).

By: (10th : RAID (Symposium) (10th : 2007 : Gold Coast, Qld.)Contributor(s): Kruegel, Christopher, 1976- | Lippmann, Richard | Clark, Andrew, 1971-Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 4637. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York, NY : Springer-Verlag, ©2007. Description: 1 online resource (xii, 336 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540743200; 3540743200; 3540743197; 9783540743194Other title: RAID 2007Subject(s): Computer security -- Congresses | Computers -- Access control -- Congresses | Informatique | Computer security | Computers -- Access control | computers | samenleving | society | informatiesystemen | information systems | computerwetenschappen | computer sciences | computernetwerken | computer networks | gegevensbeheer | data management | operating systems | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Recent advances in intrusion detection.DDC classification: 005.8 LOC classification: QA76.9.A25 | R34 2007ebOnline resources: Click here to access online
Contents:
Host-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation -- Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

" ... the 10th Symposium on Recent Advances in Intrusion Detection (RAID 2007)"--Preface

Includes bibliographical references and index.

Print version record.

Host-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation -- Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.

Powered by Koha