LEADER 06353nam 22008535 450 001 9910144348403321 005 20200630071015.0 010 $a3-540-30143-7 024 7 $a10.1007/b100714 035 $a(CKB)1000000000212567 035 $a(DE-He213)978-3-540-30143-1 035 $a(SSID)ssj0000233718 035 $a(PQKBManifestationID)11187492 035 $a(PQKBTitleCode)TC0000233718 035 $a(PQKBWorkID)10221268 035 $a(PQKB)11038896 035 $a(MiAaPQ)EBC3088417 035 $a(PPN)155210890 035 $a(EXLCZ)991000000000212567 100 $a20121227d2004 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRecent Advances in Intrusion Detection $e7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings /$fedited by Erland Jonsson, Alfonso Valdes, Magnus Almgren 205 $a1st ed. 2004. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2004. 215 $a1 online resource (X, 322 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v3224 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-23123-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aModelling Process Behaviour -- Automatic Extraction of Accurate Application-Specific Sandboxing Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths -- Detecting Worms and Viruses -- HoneyStat: Local Worm Detection Using Honeypots -- Fast Detection of Scanning Worm Infections -- Detecting Unknown Massive Mailing Viruses Using Proactive Methods -- Attack and Alert Analysis -- Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection -- Attack Analysis and Detection for Ad Hoc Routing Protocols -- On the Design and Use of Internet Sinks for Network Abuse Monitoring -- Practical Experience -- Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information -- Symantec Deception Server Experience with a Commercial Deception System -- Anomaly Detection -- Anomalous Payload-Based Network Intrusion Detection -- Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix -- Seurat: A Pointillist Approach to Anomaly Detection -- Formal Analysis for Intrusion Detection -- Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds -- Formal Reasoning About Intrusion Detection Systems -- RheoStat: Real-Time Risk Management. 330 $aOn behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15?17, 2004. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial perspectives. We also encouraged discussions that - dressed issues that arise when studying intrusion detection, including infor- tion gathering and monitoring, from a wider perspective. Thus, we had sessions on detection of worms and viruses, attack analysis, and practical experience reports. The RAID 2004 Program Committee received 118 paper submissions from all over the world. All submissions were carefully reviewed by several members of the Program Committee and selection was made on the basis of scienti?c novelty, importance to the ?eld, and technical quality. Final selection took place at a meeting held May 24 in Paris, France. Fourteen papers and two practical experience reports were selected for presentation and publication in the conf- ence proceedings. In addition, a number of papers describing work in progress were selected for presentation at the symposium. The keynote addresswas given by Bruce Schneier of Counterpane Systems. H? akan Kvarnstrom ¨ of TeliaSonera gave an invited talk on the topic ?Fighting Fraud in Telecom Environments. ? A successful symposium is the result of the joint e?ort of many people. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v3224 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers and civilization 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science) 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 14$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 676 $a005.8 702 $aJonsson$b Erland$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aValdes$b Alfonso$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlmgren$b Magnus$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aRAID 2004 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910144348403321 996 $aRecent Advances in Intrusion Detection$9772673 997 $aUNINA