04613nam 22007455 450 99646552270331620200701111105.03-540-74320-010.1007/978-3-540-74320-0(CKB)1000000000490910(SSID)ssj0000319758(PQKBManifestationID)11235110(PQKBTitleCode)TC0000319758(PQKBWorkID)10338640(PQKB)10548800(DE-He213)978-3-540-74320-0(MiAaPQ)EBC3067801(PPN)123164400(EXLCZ)99100000000049091020100301d2007 u| 0engurnn|008mamaatxtccrRecent Advances in Intrusion Detection[electronic resource] 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings /edited by Christopher Kruegel, Richard Lippmann, Andrew Clark1st ed. 2007.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2007.1 online resource (XII, 340 p.) Security and Cryptology ;4637"... the 10th Symposium on Recent Advances in Intrusion Detection (RAID 2007)"--Pref.3-540-74319-7 Includes bibliographical references and index.Host-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation – Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- “Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.Security and Cryptology ;4637Data encryption (Computer science)Management information systemsComputer scienceComputers and civilizationComputer communication systemsOperating systems (Computers)Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Data encryption (Computer science).Management information systems.Computer science.Computers and civilization.Computer communication systems.Operating systems (Computers).Cryptology.Management of Computing and Information Systems.Computers and Society.Computer Communication Networks.Operating Systems.005.8Kruegel Christopheredthttp://id.loc.gov/vocabulary/relators/edtLippmann Richardedthttp://id.loc.gov/vocabulary/relators/edtClark Andrewedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465522703316Recent Advances in Intrusion Detection772673UNISA