Recent Advances in Intrusion Detection 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings / [electronic resource] :
edited by Diego Zamboni, Christopher Kruegel.
- 1st ed. 2006.
- XII, 331 p. online resource.
- Information Systems and Applications, incl. Internet/Web, and HCI, 4219 2946-1642 ; .
- Information Systems and Applications, incl. Internet/Web, and HCI, 4219 .
Recent Advances in Intrusion Detection -- A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures -- Behavioral Distance Measurement Using Hidden Markov Models -- Automated Discovery of Mimicry Attacks -- Allergy Attack Against Automatic Signature Generation -- Paragraph: Thwarting Signature Learning by Training Maliciously -- Anomaly Detector Performance Evaluation Using a Parameterized Environment -- Ranking Attack Graphs -- Using Hidden Markov Models to Evaluate the Risks of Intrusions -- The Nepenthes Platform: An Efficient Approach to Collect Malware -- Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots -- Fast and Evasive Attacks: Highlighting the Challenges Ahead -- Anagram: A Content Anomaly Detector Resistant to Mimicry Attack -- DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET -- Enhancing Network Intrusion Detection with Integrated Sampling and Filtering -- WIND: Workload-Aware INtrusion Detection -- SafeCard: A Gigabit IPS on the Network Card.
9783540397250
10.1007/11856214 doi
Electronic data processing--Management.
Computers and civilization.
Cryptography.
Data encryption (Computer science).
Computer networks .
Operating systems (Computers).
IT Operations.
Computers and Society.
Cryptology.
Computer Communication Networks.
Operating Systems.
QA76.9.M3
004.068
Recent Advances in Intrusion Detection -- A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures -- Behavioral Distance Measurement Using Hidden Markov Models -- Automated Discovery of Mimicry Attacks -- Allergy Attack Against Automatic Signature Generation -- Paragraph: Thwarting Signature Learning by Training Maliciously -- Anomaly Detector Performance Evaluation Using a Parameterized Environment -- Ranking Attack Graphs -- Using Hidden Markov Models to Evaluate the Risks of Intrusions -- The Nepenthes Platform: An Efficient Approach to Collect Malware -- Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots -- Fast and Evasive Attacks: Highlighting the Challenges Ahead -- Anagram: A Content Anomaly Detector Resistant to Mimicry Attack -- DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET -- Enhancing Network Intrusion Detection with Integrated Sampling and Filtering -- WIND: Workload-Aware INtrusion Detection -- SafeCard: A Gigabit IPS on the Network Card.
9783540397250
10.1007/11856214 doi
Electronic data processing--Management.
Computers and civilization.
Cryptography.
Data encryption (Computer science).
Computer networks .
Operating systems (Computers).
IT Operations.
Computers and Society.
Cryptology.
Computer Communication Networks.
Operating Systems.
QA76.9.M3
004.068