Recent Advances in Intrusion Detection 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6307 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Network Protection
- What Is the Impact of P2P Traffic on Anomaly Detection?
- A Centralized Monitoring Infrastructure for Improving DNS Security
- Behavior-Based Worm Detectors Compared
- High Performance
- Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams
- GrAVity: A Massively Parallel Antivirus Engine
- Malware Detection and Defence
- Automatic Discovery of Parasitic Malware
- BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
- CANVuS: Context-Aware Network Vulnerability Scanning
- HyperCheck: A Hardware-Assisted Integrity Monitor
- Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
- Bait Your Hook: A Novel Detection Technique for Keyloggers
- Evaluation
- Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security
- On Challenges in Evaluating Malware Clustering
- Why Did My Detector Do That?!
- Forensics
- NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring
- Live and Trustworthy Forensic Analysis of Commodity Production Systems
- Hybrid Analysis and Control of Malware
- Anomaly Detection
- Anomaly Detection and Mitigation for Disaster Area Networks
- Community Epidemic Detection Using Time-Correlated Anomalies
- A Data-Centric Approach to Insider Attack Detection in Database Systems
- Privilege States Based Access Control for Fine-Grained Intrusion Response
- Web Security
- Abusing Social Networks for Automated User Profiling
- An Analysis of Rogue AV Campaigns
- Fast-Flux Bot Detection in Real Time
- Posters
- A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery
- A Distributed Honeynet at KFUPM: A Case Study
- Aspect-Based Attack Detection in Large-Scale Networks
- Detecting Network Anomalies in Backbone Networks
- Detecting the Onset of Infection for Secure Hosts
- Eliminating Human Specification in Static Analysis
- Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009
- Inferring Protocol State Machine from Real-World Trace
- MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA
- On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach
- Security System for Encrypted Environments (S2E2)
- Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence
- Toward Specification-Based Intrusion Detection for Web Applications
- Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices
- Using IRP for Malware Detection.