Recent Advances in Intrusion Detection
Springer Berlin (Verlag)
978-3-642-04341-3 (ISBN)
Recent Advances in Intrusion Detection Anomaly and Specification-Based Approaches.- Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems.- Protecting a Moving Target: Addressing Web Application Concept Drift.- Adaptive Anomaly Detection via Self-calibration and Dynamic Updating.- Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems.- Malware Detection and Prevention (I).- Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language.- Automatic Generation of String Signatures for Malware Detection.- PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime.- Network and Host Intrusion Detection and Prevention.- Automatically Adapting a Trained Anomaly Detector to Software Patches.- Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.- Automated Behavioral Fingerprinting.- Intrusion Detection for Mobile Devices.- SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection.- Keystroke-Based User Identification on Smart Phones.- VirusMeter: Preventing Your Cellphone from Spies.- High-Performance Intrusion Detection.- Regular Expression Matching on Graphics Hardware for Intrusion Detection.- Multi-byte Regular Expression Matching with Speculation.- Malware Detection and Prevention (II).- Toward Revealing Kernel Malware Behavior in Virtual Execution Environments.- Exploiting Temporal Persistence to Detect Covert Botnet Channels.- Posters.- An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection.- Automatic Software Instrumentation for the Detection of Non-control-data Attacks.- BLADE: Slashing the Invisible Channel of Drive-by DownloadMalware.- CERN Investigation of Network Behaviour and Anomaly Detection.- Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy.- Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach.- Autonomic Intrusion Detection System.- ALICE@home: Distributed Framework for Detecting Malicious Sites.- Packet Space Analysis of Intrusion Detection Signatures.- Traffic Behaviour Characterization Using NetMate.- On the Inefficient Use of Entropy for Anomaly Detection.- Browser-Based Intrusion Prevention System.- Using Formal Grammar and Genetic Operators to Evolve Malware.- Method for Detecting Unknown Malicious Executables.- Brave New World: Pervasive Insecurity of Embedded Network Devices.- DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Erscheint lt. Verlag | 11.9.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 384 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 611 g |
Themenwelt | Informatik ► Software Entwicklung ► User Interfaces (HCI) |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
Schlagworte | Anomaly Detection • attack prevention • classification • digital biometrics • fingerprint • Fingerprinting • Firewall • Hardcover, Softcover / Informatik, EDV/Informatik • honeypots • insider-attack detection • Intrusion Detection • Intrusion Prevention • Malware • Network Security • privacy • security • threats analysis |
ISBN-10 | 3-642-04341-0 / 3642043410 |
ISBN-13 | 978-3-642-04341-3 / 9783642043413 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich