Cargando…

Recent Advances in Intrusion Detection 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Jha, Somesh (Editor ), Sommer, Robin (Editor ), Kreibich, Christian (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6307
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Network Protection
  • What Is the Impact of P2P Traffic on Anomaly Detection?
  • A Centralized Monitoring Infrastructure for Improving DNS Security
  • Behavior-Based Worm Detectors Compared
  • High Performance
  • Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams
  • GrAVity: A Massively Parallel Antivirus Engine
  • Malware Detection and Defence
  • Automatic Discovery of Parasitic Malware
  • BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
  • CANVuS: Context-Aware Network Vulnerability Scanning
  • HyperCheck: A Hardware-Assisted Integrity Monitor
  • Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
  • Bait Your Hook: A Novel Detection Technique for Keyloggers
  • Evaluation
  • Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security
  • On Challenges in Evaluating Malware Clustering
  • Why Did My Detector Do That?!
  • Forensics
  • NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring
  • Live and Trustworthy Forensic Analysis of Commodity Production Systems
  • Hybrid Analysis and Control of Malware
  • Anomaly Detection
  • Anomaly Detection and Mitigation for Disaster Area Networks
  • Community Epidemic Detection Using Time-Correlated Anomalies
  • A Data-Centric Approach to Insider Attack Detection in Database Systems
  • Privilege States Based Access Control for Fine-Grained Intrusion Response
  • Web Security
  • Abusing Social Networks for Automated User Profiling
  • An Analysis of Rogue AV Campaigns
  • Fast-Flux Bot Detection in Real Time
  • Posters
  • A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery
  • A Distributed Honeynet at KFUPM: A Case Study
  • Aspect-Based Attack Detection in Large-Scale Networks
  • Detecting Network Anomalies in Backbone Networks
  • Detecting the Onset of Infection for Secure Hosts
  • Eliminating Human Specification in Static Analysis
  • Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009
  • Inferring Protocol State Machine from Real-World Trace
  • MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA
  • On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach
  • Security System for Encrypted Environments (S2E2)
  • Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence
  • Toward Specification-Based Intrusion Detection for Web Applications
  • Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices
  • Using IRP for Malware Detection.