LEADER 03537nam 2200601 a 450 001 9910484233803321 005 20200520144314.0 010 $a3-540-74320-0 024 7 $a10.1007/978-3-540-74320-0 035 $a(CKB)1000000000490910 035 $a(SSID)ssj0000319758 035 $a(PQKBManifestationID)11235110 035 $a(PQKBTitleCode)TC0000319758 035 $a(PQKBWorkID)10338640 035 $a(PQKB)10548800 035 $a(DE-He213)978-3-540-74320-0 035 $a(MiAaPQ)EBC3067801 035 $a(PPN)123164400 035 $a(EXLCZ)991000000000490910 100 $a20070711d2007 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRecent advances in intrusion detection $e10th International Symposium, RAID 2007, Gold Goast [i.e. Coast], Australia, September 5-7, 2007 : proceedings /$fChristopher Kruegel, Richard Lippmann, Andrew Clark (eds.) 205 $a1st ed. 2007. 210 $aBerlin $cSpringer-Verlag$dc2007 215 $a1 online resource (XII, 340 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v4637 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $a"... the 10th Symposium on Recent Advances in Intrusion Detection (RAID 2007)"--Pref. 311 $a3-540-74319-7 320 $aIncludes bibliographical references and index. 327 $aHost-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation ? Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- ?Out-of-the-Box? Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. 410 0$aLecture notes in computer science ;$v4637. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 517 3 $aRAID 2007 606 $aComputer security$vCongresses 606 $aComputers$xAccess control$vCongresses 615 0$aComputer security 615 0$aComputers$xAccess control 676 $a005.8 701 $aKruegel$b Christopher$f1976-$01763078 701 $aLippmann$b Richard$01764064 701 $aClark$b Andrew$f1971-$01764065 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484233803321 996 $aRecent advances in intrusion detection$94204804 997 $aUNINA