did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540231233

Recent Advances In Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings

by ; ; ; ;
  • ISBN13:

    9783540231233

  • ISBN10:

    3540231234

  • Format: Paperback
  • Copyright: 2004-11-15
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $109.00 Save up to $90.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection, RAID 2004, held in Sophia Antipolis, France, in September 2004. The 16 revised full papers presented were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on modelling process behavior, detecting worms and viruses, attack and alert analysis, practical experience, anomaly detection, and formal analysis for intrusion detection.

Table of Contents

Modelling Process Behaviour
Automatic Extraction of Accurate Application-Specific Sandboxing Policy
1(20)
Lap Chung Lam and Tzi-cker Chiueh
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths
21(18)
Haizhi Xu, Wenliang Du, and Steve J. Chapin
Detecting Worms and Viruses
HoneyStat: Local Worm Detection Using Honeypots
39(20)
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian Grizzard, John Levine, and Henry Owen
Fast Detection of Scanning Worm Infections
59(23)
Stuart E. Schechter, Jaeyeon Jung, and Arthur W. Berger
Detecting Unknown Massive Mailing Viruses Using Proactive Methods
82(20)
Ruiqi Hu and Aloysius K. Mok
Attack and Alert Analysis
Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection
102(23)
Tadeusz Pietraszek
Attack Analysis and Detection for Ad Hoc Routing Protocols
125(21)
Yi-an Huang and Wenke Lee
On the Design and Use of Internet Sinks for Network Abuse Monitoring
146(20)
Vinod Yegneswaran, Paul Barford, and Dave Plonka
Practical Experience
Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information
166(22)
Jouni Viinikka and Hervé Debar
Symantec Deception Server Experience with a Commercial Deception System
188(15)
Brian Hernacki, Jeremy Bennett, and Thomas Lofgren
Anomalous Payload-Based Network Intrusion Detection
203(20)
Ke Wang and Salvatore J. Stolfo
Anomaly Detection
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix
223(15)
Mizuki Oka, Yoshih,iro Oyam,a, Hirotake Abe, and Kazuhiko Kato
Seurat: A Pointillist Approach to Anomaly Detection
238(20)
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, and Hui Zhang
Formal Analysis for Intrusion Detection
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
258(20)
Avrim Blum, Dawn Song, and Shobha Venkatara,man.
Formal Reasoning About Intrusion Detection Systems
278(18)
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, and Karl Levitt
RheoStat: Real-Time Risk Management
296(19)
Ashish Gehani and Gershon Kedem
Author Index 315

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program