LEADER 04594nam 2200577 a 450 001 9910483410203321 005 20200520144314.0 010 $a3-540-31779-1 024 7 $a10.1007/11663812 035 $a(CKB)1000000000232797 035 $a(SSID)ssj0000319760 035 $a(PQKBManifestationID)11255739 035 $a(PQKBTitleCode)TC0000319760 035 $a(PQKBWorkID)10338747 035 $a(PQKB)11071315 035 $a(DE-He213)978-3-540-31779-1 035 $a(MiAaPQ)EBC3067946 035 $a(PPN)123131065 035 $a(EXLCZ)991000000000232797 100 $a20051223d2006 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRecent advances in intrusion detection $e8th international symposium, RAID 2005, Seattle, WA., USA, September 7-9, 2005 : revised papers /$fAlfonso Valdes, Diego Zamboni (eds.) 205 $a1st ed. 2006. 210 $aBerlin ;$aNew York $cSpringer$dc2006 215 $a1 online resource (X, 351 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v3858 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-31778-3 320 $aIncludes bibliographical references and index. 327 $aWorm Detection and Containment (I) -- Virtual Playgrounds for Worm Behavior Investigation -- Empirical Analysis of Rate Limiting Mechanisms -- Anomaly Detection -- COTS Diversity Based Intrusion Detection and Application to Web Servers -- Behavioral Distance for Intrusion Detection -- Intrusion Prevention and Response -- FLIPS: Hybrid Adaptive Intrusion Prevention -- Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card -- Defending Against Injection Attacks Through Context-Sensitive String Evaluation -- System Call-Based Intrusion Detection -- Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks -- On Random-Inspection-Based Intrusion Detection -- Environment-Sensitive Intrusion Detection -- Worm Detection and Containment (II) -- Polymorphic Worm Detection Using Structural Information of Executables -- Anomalous Payload-Based Worm Detection and Signature Generation -- Network-Based Intrusion Detection -- On Interactive Internet Traffic Replay -- Interactive Visualization for Network and Port Scan Detection -- A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows -- Mobile and Wireless Networks -- Sequence Number-Based MAC Address Spoof Detection -- A Specification-Based Intrusion Detection Model for OLSR. 330 $aOn behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial prospectives. We also encouraged discussions that addressed issues that arise when studying intrusion detection, including monitoring, performance and validation, from a wider perspective. We had sessions on the detection and containment of Internet worm attacks, anomaly detection, automated response to intrusions, host-based intrusion detection using system calls, network intrusion detection, and intrusion detection, in mobile wireless networks. The RAID 2005 Program Committee received 83 paper submissions from all over the world. All submissions were carefully reviewed by several members of Program Committee and selection was made on the basis of scientific novelty, importance to the field, and technical quality. Final selection took place at a Program Committee meeting held on May 11 and 12 in Oakland, California. Fifteen papers and two practical experience reports were selected for presentation and publication in the conference proceedings. The keynote address was given by Phil Attfield of the Northwest Security Institute. 410 0$aLecture notes in computer science ;$v3858. 606 $aComputer security$vCongresses 606 $aComputers$xAccess control$vCongresses 615 0$aComputer security 615 0$aComputers$xAccess control 676 $a005.8 701 $aValdes$b Alfonso$01761330 701 $aZamboni$b Diego$01752534 712 12$aRAID 2005 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483410203321 996 $aRecent advances in intrusion detection$94200688 997 $aUNINA