Recent Advances in Intrusion Detection 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005. Revised Papers /

On behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005. The symposium brought together leading researchers and practitioners from a...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Valdes, Alfonso (Επιμελητής έκδοσης), Zamboni, Diego (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 3858
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Worm Detection and Containment (I)
  • Virtual Playgrounds for Worm Behavior Investigation
  • Empirical Analysis of Rate Limiting Mechanisms
  • Anomaly Detection
  • COTS Diversity Based Intrusion Detection and Application to Web Servers
  • Behavioral Distance for Intrusion Detection
  • Intrusion Prevention and Response
  • FLIPS: Hybrid Adaptive Intrusion Prevention
  • Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card
  • Defending Against Injection Attacks Through Context-Sensitive String Evaluation
  • System Call-Based Intrusion Detection
  • Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks
  • On Random-Inspection-Based Intrusion Detection
  • Environment-Sensitive Intrusion Detection
  • Worm Detection and Containment (II)
  • Polymorphic Worm Detection Using Structural Information of Executables
  • Anomalous Payload-Based Worm Detection and Signature Generation
  • Network-Based Intrusion Detection
  • On Interactive Internet Traffic Replay
  • Interactive Visualization for Network and Port Scan Detection
  • A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows
  • Mobile and Wireless Networks
  • Sequence Number-Based MAC Address Spoof Detection
  • A Specification-Based Intrusion Detection Model for OLSR.