Recent Advances in Intrusion Detection [electronic resource] : 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedings / edited by Christopher Kruegel, Richard Lippmann, Andrew Clark.

Contributor(s): Kruegel, Christopher [editor.] | Lippmann, Richard [editor.] | Clark, Andrew [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 4637Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007Description: XII, 340 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540743200Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Information Systems | Computer Science | Management of Computing and Information Systems | Computers and Society | Data Encryption | Computer Communication Networks | Operating SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.74 LOC classification: QA76.9.M3Online resources: Click here to access online
Contents:
Host-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation – Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- “Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK7747

Host-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation – Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- “Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha