did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540317784

Recent Advances in Intrusion Detection : 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers

by ;
  • ISBN13:

    9783540317784

  • ISBN10:

    3540317783

  • Format: Paperback
  • Copyright: 2006-02-15
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $109.00 Save up to $90.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection, RAID 2005, held in Seattle, WA, USA in September 2005. The 15 revised full papers presented together with 2 practical experience reports were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on worm detection and containment, anomaly detection, intrusion prevention and response, intrusion detection based on system calls and network-based, as well as intrusion detection in mobile and wireless networks.

Table of Contents

Worm Detection and Containment (I)
Virtual Playgrounds for Worm Behavior Investigation
Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
1(21)
Empirical Analysis of Rate Limiting Mechanisms
Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang
22(21)
Anomaly Detection
COTS Diversity Based Intrusion Detection and Application to Web Servers
Eric Totel, Frédéric Majorczyk, Ludovic Mé
43(20)
Behavioral Distance for Intrusion Detection
Debin Gao, Michael K. Reiter, Dawn Song
63(19)
Intrusion Prevention and Response
FLIPS: Hybrid Adaptive Intrusion Prevention
Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
82(20)
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card
H. Bos, Kaiming Huang
102(22)
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Tadeusz Pietraszek, Chris Vanden Berghe
124(22)
System Call-Based Intrusion Detection
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks
Sufatrio, Roland H.C. Yap
146(19)
On Random-Inspection-Based Intrusion Detection
Simon P. Chung, Aloysius K. Mok
165(20)
Environment-Sensitive Intrusion Detection
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
185(22)
Worm Detection and Containment (II)
Polymorphic Worm Detection Using Structural Information of Executables
Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna
207(20)
Anomalous Payload-Based Worm Detection and Signature Generation
Ke Wang, Gabriela Cretu, Salvatore J. Stolfo
227(20)
Network-Based Intrusion Detection
On Interactive Internet Traffic Replay
Seung-Sun Hong, S. Felix Wu
247(18)
Interactive Visualization for Network and Port Scan Detection
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
265(19)
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows
Ramkumar Chinchani, Eric van den Berg
284(25)
Mobile and Wireless Networks
Sequence Number-Based MAC Address Spoof Detection
Fanglu Guo, Tzi-cker Chiueh
309(21)
A Specification-Based Intrusion Detection Model for OLSR
Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl Levitt
330(21)
Author Index 351

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program