ISBN-10:
354087402X
ISBN-13:
9783540874027
Pub. Date:
09/28/2008
Publisher:
Springer Berlin Heidelberg
Recent Advances in Intrusion Detection: 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008, Proceedings / Edition 1

Recent Advances in Intrusion Detection: 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008, Proceedings / Edition 1

Paperback

Current price is , Original price is $119.0. You

Temporarily Out of Stock Online

Please check back later for updated availability.

This item is available online through Marketplace sellers.

Product Details

ISBN-13: 9783540874027
Publisher: Springer Berlin Heidelberg
Publication date: 09/28/2008
Series: Lecture Notes in Computer Science / Security and Cryptology Series , #5230
Edition description: 2008
Pages: 424
Product dimensions: 6.10(w) x 9.30(h) x 1.00(d)

Table of Contents

Recent Advances in Intrusion Detection.- Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.- Countering Persistent Kernel Rootkits through Systematic Hook Discovery.- Malware Detection and Prevention.- Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections.- A First Step towards Live Botmaster Traceback.- A Layered Architecture for Detecting Malicious Behaviors.- A Study of the Packer Problem and Its Solutions.- High Performance Intrusion Detection and Evasion.- Gnort: High Performance Network Intrusion Detection Using Graphics Processors.- Predicting the Resource Consumption of Network Intrusion Detection Systems.- High-Speed Matching of Vulnerability Signatures.- Web Application Testing and Evasion.- Swarm Attacks against Network-Level Emulation/Analysis.- Leveraging User Interactions for In-Depth Testing of Web Applications.- Model-Based Covert Timing Channels: Automated Modeling and Evasion.- Alert Correlation and Worm Detection.- Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.- On the Limits of Payload-Oblivious Network Attack Detection.- Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling.- A Multi-Sensor Model to Improve Automated Attack Detection.- Anomaly Detection and Network Traffic Analysis.- Monitoring SIP Traffic Using Support Vector Machines.- The Effect of Clock Resolution on Keystroke Dynamics.- A Comparative Evaluation of Anomaly Detectors under Portscan Attacks.- Advanced Network Fingerprinting.- Posters.- On Evaluation of Response Cost for Intrusion Response Systems.- WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract).- Evading Anomaly Detection through Variance Injection Attacks on PCA.- Anticipating Hidden Text Salting in Emails.- Improving Anomaly Detection Error Rate by Collective Trust Modeling.- Database Intrusion Detection and Response.- An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract).- Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract).- Automating the Analysis of Honeypot Data (Extended Abstract).- Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response.- Monitoring the Execution of Third-Party Software on Mobile Devices.- Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).- Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract).- Anomalous Taint Detection.- Deep Packet Inspection Using Message Passing Networks.- System Call API Obfuscation (Extended Abstract).

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews