Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedings /
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the Special Interest Group Security — Intrusion Detection and Response (SI...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3548 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Obfuscated Code Detection
- Analyzing Memory Accesses in Obfuscated x86 Executables
- Hybrid Engine for Polymorphic Shellcode Detection
- Honeypots
- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities
- A Pointillist Approach for Comparing Honeypots
- Vulnerability Assessment and Exploit Analysis
- Automatic Detection of Attacks on Cryptographic Protocols: A Case Study
- METAL – A Tool for Extracting Attack Manifestations
- Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone
- Anomaly Detection
- A Learning-Based Approach to the Detection of SQL Attacks
- Masquerade Detection via Customized Grammars
- A Prevention Model for Algorithmic Complexity Attacks
- Misuse Detection
- Detecting Malicious Code by Model Checking
- Improving the Efficiency of Misuse Detection
- Distributed Intrusion Detection and IDS Testing
- Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context
- TCPtransform: Property-Oriented TCP Traffic Transformation.