rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540266136

Detection of Intrusions And Malware, and Vulnerability Assessment: Second International Conference, Dimva 2005, Vienna, Austria, July 7-8, 2005, Proceedings

by Julisch, Klaus; Kruegel, Christopher
  • ISBN13:

    9783540266136

  • ISBN10:

    3540266135

  • eBook ISBN(s):

    9783540316459

  • Format: Paperback
  • Copyright: 2005-08-15
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $79.20
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book constitutes the refereed proceedings of the second International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2005, held in Vienna, Austria, in July 2005. The 14 revised full papers presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on obfuscated code detection, honeypots, vulnerability assessment and exploit analysis, anomaly detection, misuse detection, and distributed intrusion detection and IDS testing.

Table of Contents

Obfuscated Code Detection
Analyzing Memory Accesses in Obfuscated x86 Executables
1(18)
Michael Venable
Mohamed R. Chouchane
Md Enamul Karim
Arun Lakhotia
Hybrid Engine for Polymorphic Shellcode Detection
19(13)
Udo Payer
Peter Teufl
Mario Lamberger
Honeypots
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities
32(19)
Jedidiah R. Crandall
S. Felix Wu
Frederic T. Chong
A Pointillist Approach for Comparing Honeypots
51(18)
Fabien Pouget
Thorsten Holz
Vulnerability Assessment and Exploit Analysis
Automatic Detection of Attacks on Cryptographic Protocols: A Case Study
69(16)
Ivan Cibrario B.
Luca Durante
Riccardo Sisto
Adriano Valenzano
Metal -- A Tool for Extracting Attack Manifestations
85(18)
Ulf Larson
Emilie Lundin-Barse
Erland Jonsson
Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone
103(20)
Thomas Dubendorfer
Arno Wagner
Theus Hossmann
Bernhard Plattner
Anomaly Detection
A Learning-Based Approach to the Detection of SQL Attacks
123(18)
Fredrik Valeur
Darren Mutz
Giovanni Vigna
Masquerade Detection via Customized Grammars
141(19)
Mario Latendresse
A Prevention Model for Algorithmic Complexity Attacks
160(14)
Suraiya Khan
Issa Traore
Misuse Detection
Detecting Malicious Code by Model Checking
174(14)
Johannes Kinder
Stefan Katzenbeisser
Christian Schallhart
Helmut Veith
Improving the Efficiency of Misuse Detection
188(18)
Michael Meier
Sebastian Schmerl
Hartmut Koenig
Distributed Intrusion Detection and IDS Testing
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context
206(16)
Holger Dreger
Christian Kreibich
Vern Paxson
Robin Sommer
TCPtransform: Property-Oriented TCP Traffic Transformation
222(19)
Seung-Sun Hong
Fiona Wong
S. Felix Wu
Bjorn Lilja
Tony Y. Yohansson
Henric Johnson
Ame Nelsson
Author Index 241

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program