Recent Advances in Intrusion Detection: 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers

Pirmais vāks
Springer Science & Business Media, 2006. gada 3. febr. - 350 lappuses
On behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial prospectives. We also encouraged discussions that addressed issues that arise when studying intrusion detection, including monitoring, performance and validation, from a wider perspective. We had sessions on the detection and containment of Internet worm attacks, anomaly detection, automated response to intrusions, host-based intrusion detection using system calls, network intrusion detection, and intrusion detection, in mobile wireless networks. The RAID 2005 Program Committee received 83 paper submissions from all over the world. All submissions were carefully reviewed by several members of Program Committee and selection was made on the basis of scientific novelty, importance to the field, and technical quality. Final selection took place at a Program Committee meeting held on May 11 and 12 in Oakland, California. Fifteen papers and two practical experience reports were selected for presentation and publication in the conference proceedings. The keynote address was given by Phil Attfield of the Northwest Security Institute.

No grāmatas satura

Saturs

Worm Detection and Containment
1
Empirical Analysis of Rate Limiting Mechanisms
22
Anomaly Detection
43
Behavioral Distance for Intrusion Detection
63
Intrusion Prevention and Response
82
Towards SoftwareBased Signature Detection for Intrusion Prevention
102
Defending Against Injection Attacks Through ContextSensitive
124
System CallBased Intrusion Detection
146
Worm Detection and Containment II
207
Anomalous PayloadBased Worm Detection and Signature Generation
227
NetworkBased Intrusion Detection
247
Interactive Visualization for Network and Port Scan Detection
265
A Fast Static Analysis Approach to Detect Exploit Code Inside
284
Mobile and Wireless Networks
309
A SpecificationBased Intrusion Detection Model for OLSR
330
Author Index
351

On RandomInspectionBased Intrusion Detection
165
EnvironmentSensitive Intrusion Detection
185

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Bibliogrāfiskā informācija