Recent Advances in Intrusion Detection 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings /

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15-17, 2004. The symposium brought together leading researchers...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Jonsson, Erland (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Valdes, Alfonso (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Almgren, Magnus (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Έκδοση:1st ed. 2004.
Σειρά:Lecture Notes in Computer Science, 3224
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Modelling Process Behaviour
  • Automatic Extraction of Accurate Application-Specific Sandboxing Policy
  • Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths
  • Detecting Worms and Viruses
  • HoneyStat: Local Worm Detection Using Honeypots
  • Fast Detection of Scanning Worm Infections
  • Detecting Unknown Massive Mailing Viruses Using Proactive Methods
  • Attack and Alert Analysis
  • Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection
  • Attack Analysis and Detection for Ad Hoc Routing Protocols
  • On the Design and Use of Internet Sinks for Network Abuse Monitoring
  • Practical Experience
  • Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information
  • Symantec Deception Server Experience with a Commercial Deception System
  • Anomaly Detection
  • Anomalous Payload-Based Network Intrusion Detection
  • Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix
  • Seurat: A Pointillist Approach to Anomaly Detection
  • Formal Analysis for Intrusion Detection
  • Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
  • Formal Reasoning About Intrusion Detection Systems
  • RheoStat: Real-Time Risk Management.