Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedings /

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the Special Interest Group Security — Intrusion Detection and Response (SI...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Julisch, Klaus (Επιμελητής έκδοσης), Kruegel, Christopher (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3548
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Obfuscated Code Detection
  • Analyzing Memory Accesses in Obfuscated x86 Executables
  • Hybrid Engine for Polymorphic Shellcode Detection
  • Honeypots
  • Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities
  • A Pointillist Approach for Comparing Honeypots
  • Vulnerability Assessment and Exploit Analysis
  • Automatic Detection of Attacks on Cryptographic Protocols: A Case Study
  • METAL – A Tool for Extracting Attack Manifestations
  • Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone
  • Anomaly Detection
  • A Learning-Based Approach to the Detection of SQL Attacks
  • Masquerade Detection via Customized Grammars
  • A Prevention Model for Algorithmic Complexity Attacks
  • Misuse Detection
  • Detecting Malicious Code by Model Checking
  • Improving the Efficiency of Misuse Detection
  • Distributed Intrusion Detection and IDS Testing
  • Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context
  • TCPtransform: Property-Oriented TCP Traffic Transformation.