03537nam 2200601 a 450 991048423380332120200520144314.03-540-74320-010.1007/978-3-540-74320-0(CKB)1000000000490910(SSID)ssj0000319758(PQKBManifestationID)11235110(PQKBTitleCode)TC0000319758(PQKBWorkID)10338640(PQKB)10548800(DE-He213)978-3-540-74320-0(MiAaPQ)EBC3067801(PPN)123164400(EXLCZ)99100000000049091020070711d2007 uy 0engurnn|008mamaatxtccrRecent advances in intrusion detection 10th International Symposium, RAID 2007, Gold Goast [i.e. Coast], Australia, September 5-7, 2007 : proceedings /Christopher Kruegel, Richard Lippmann, Andrew Clark (eds.)1st ed. 2007.Berlin Springer-Verlagc20071 online resource (XII, 340 p.) Lecture notes in computer science,0302-9743 ;4637LNCS sublibrary. SL 4, Security and cryptology"... the 10th Symposium on Recent Advances in Intrusion Detection (RAID 2007)"--Pref.3-540-74319-7 Includes bibliographical references and index.Host-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation – Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- “Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.Lecture notes in computer science ;4637.LNCS sublibrary.SL 4,Security and cryptology.RAID 2007Computer securityCongressesComputersAccess controlCongressesComputer securityComputersAccess control005.8Kruegel Christopher1976-1763078Lippmann Richard1764064Clark Andrew1971-1764065MiAaPQMiAaPQMiAaPQBOOK9910484233803321Recent advances in intrusion detection4204804UNINA