Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Detection of Intrusions and Malware, and Vulnerability Assessment -

Detection of Intrusions and Malware, and Vulnerability Assessment

Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings
Buch | Softcover
X, 195 Seiten
2006 | 2006
Springer Berlin (Verlag)
978-3-540-36014-8 (ISBN)
CHF 74,85 inkl. MwSt
lt;p>This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in July 2006.

The 11 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on code analysis, intrusion detection, threat protection and response, malware and forensics, and deployment scenarios.

Code Analysis.- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.- Using Static Program Analysis to Aid Intrusion Detection.- Intrusion Detection.- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix.- Network-Level Polymorphic Shellcode Detection Using Emulation.- Detecting Unknown Network Attacks Using Language Models.- Threat Protection and Response.- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones.- Using Contextual Security Policies for Threat Response.- Malware and Forensics.- Detecting Self-mutating Malware Using Control-Flow Graph Matching.- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.- Deployment Scenarios.- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs.- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.

Erscheint lt. Verlag 29.6.2006
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo X, 195 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 670 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • anormality detection • Audit Control • authentication • Code • Cryptographic Attacks • Deployment • Intrusion Detection • log-data analysis • network intrusion • Network Security • Pattern Analysis • privacy • Secure Communications • security • security flaws • SNMP • Trust • virtual security
ISBN-10 3-540-36014-X / 354036014X
ISBN-13 978-3-540-36014-8 / 9783540360148
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich