rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783642155116

Recent Advances in Intrusion Detection

by ; ;
  • ISBN13:

    9783642155116

  • ISBN10:

    3642155111

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-11-10
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $129.00

Summary

This book constitutes the refereed proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, held in Ottawa, Canada, in September 2010. The 24 revised full papers presented together with 15 revised poster papers were carefully reviewed and selected from 102 submissions.The papers are organized in topical sections on network protection, high performance, malware detection and defence, evaluation, forensics, anomaly detection as well as web security.

Table of Contents

Network Protection
What Is the Impact of P2P Traffic on Anomaly Detection?p. 1
A Centralized Monitoring Infrastructure for Improving DNS Securityp. 18
Behavior-Based Worm Detectors Comparedp. 38
High Performance
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagramsp. 58
GrAVity: A Massively Parallel Antivirus Enginep. 79
Malware Detection and Defence
Automatic Discovery of Parasitic Malwarep. 97
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detectionp. 118
CANVuS: Context-Aware Network Vulnerability Scanningp. 138
HyperCheck: A Hardware-Assisted Integrity Monitorp. 158
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memoryp. 178
Bait Your Hook: A Novel Detection Technique for Keyloggersp. 198
Evaluation
Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Securityp. 218
On Challenges in Evaluating Malware Clusteringp. 238
Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Ratesp. 256
Forensics
NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoringp. 277
Live and Trustworthy Forensic Analysis of Commodity Production Systemsp. 297
Hybrid Analysis and Control of Malwarep. 317
Anomaly Detection
Anomaly Detection and Mitigation for Disaster Area Networksp. 339
Community Epidemic Detection Using Time-Correlated Anomaliesp. 360
A Data-Centric Approach to Insider Attack Detection in Database Systemsp. 382
Privilege States Based Access Control for Fine-Grained Intrusion Responsep. 402
Web Security
Abusing Social Networks for Automated User Profilingp. 422
An Analysis of Rogue AV Campaignsp. 442
Fast-Flux Bot Detection in Real Timep. 464
Posters
A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgeryp. 484
A Distributed Honeynet at KFUPM: A Case Studyp. 486
Aspect-Based Attack Detection in Large-Scale Networksp. 488
Detecting Network Anomalies in Backbone Networksp. 490
Detecting the Onset of Infection for Secure Hostsp. 492
Eliminating Human Specification in Static Analysisp. 494
Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009p. 496
Inferring Protocol State Machine from Real-World Tracep. 498
MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADAp. 500
On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approachp. 502
Security System for Encrypted Environments (S2E2)p. 505
Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidencep. 508
Toward Specification-Based Intrusion Detection for Web Applicationsp. 510
Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devicesp. 512
Using IRP for Malware Detectionp. 514
Author Indexp. 517
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program