Cover image for Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedings
Title:
Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedings
Series:
Lecture notes in computer science ; 4637
Publication Information:
Berlin : Springer, 2007
Physical Description:
xii, 336 p. : ill. ; 24 cm.
ISBN:
9783540743194
General Note:
Available online version
Electronic Access:
Fulltext

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010164734 QA76.9.A25 R344 2007 Open Access Book Proceedings, Conference, Workshop etc.
Searching...

On Order

Summary

Summary

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. The 17 full papers were carefully reviewed. Each one represents an important contribution to the study of intrusion detection. Papers cover anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.


Table of Contents

Darren Mutz and William Robertson and Giovanni Vigna and Richard KemmererMonirul Sharif and Kapil Singh and Jonathon Giffin and Wenke LeeKenneth L. Ingham and Hajime InoueMarco Cova and Davide Balzarotti and Viktoria Felmetsger and Giovanni VignaMichalis Polychronakis and Kostas G. Anagnostakis and Evangelos P. MarkatosMatthias Vallentin and Robin Sommer and Jason Lee and Craig Leres and Vern Paxson and Brian TierneyShiau-Huey Wang and Chinyang Henry Tseng and Karl Levitt and Matthew BishopMarcus A. Maloof and Gregory D. StephensFederico Maggi and Stefano ZaneroMichael Bailey and Jon Oberheide and Jon Andersen and Z. Morley Mao and Farnam Jahanian and Jose NazarioXuxian Jiang and Xinyuan WangJeffrey Wilhelm and Tzi-cker ChiuehSimon P. Chung and Aloysius K. MokAdam D. Todd and Richard A. Raines and Rusty O. Baldwin and Barry E. Mullins and Steven K. RogersM. Patrick Collins and Michael K. ReiterZhuowei Li and XiaoFeng Wang and Jong Youl ChoiJohn R. Lange and Peter A. Dinda and Fabian E. Bustamante
Host-Based Intrusion Detection
Exploiting Execution Context for the Detection of Anomalous System Callsp. 1
Understanding Precision in Host Based Intrusion Detectionp. 21
Anomaly-Based Intrusion Detection
Comparing Anomaly Detection Techniques for HTTPp. 42
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applicationsp. 63
Network-Based Intrusion Detection and Response
Emulation-Based Detection of Non-self-contained Polymorphic Shellcodep. 87
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardwarep. 107
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networksp. 127
Insider Detection and Alert Correlation
Elicit: A System for Detecting Insiders Who Violate Need-to-Knowp. 146
On the Use of Different Statistical Tests for Alert Correlation - Short Paperp. 167
Malicious Code Analysis
Automated Classification and Analysis of Internet Malwarep. 178
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypotsp. 198
A Forced Sampled Execution Approach to Kernel Rootkit Identificationp. 219
Evasion
Advanced Allergy Attacks: Does a Corpus Really Help?p. 236
Alert Verification Evasion Through Server Response Forgingp. 256
Malicious Code Defense
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphsp. 276
SpyShield: Preserving Privacy from Spy Add-Onsp. 296
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systemsp. 317
Author Indexp. 337