LEADER 06873nam 22008655 450 001 996465339403316 005 20200702235410.0 010 $a3-642-04342-9 024 7 $a10.1007/978-3-642-04342-0 035 $a(CKB)1000000000784751 035 $a(SSID)ssj0000319759 035 $a(PQKBManifestationID)11236598 035 $a(PQKBTitleCode)TC0000319759 035 $a(PQKBWorkID)10339096 035 $a(PQKB)10338707 035 $a(DE-He213)978-3-642-04342-0 035 $a(MiAaPQ)EBC3064670 035 $a(PPN)139958711 035 $a(EXLCZ)991000000000784751 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRecent Advances in Intrusion Detection$b[electronic resource] $e12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009, Proceedings /$fedited by Engin Kirda, Somesh Jha, Davide Balzarotti 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XIII, 384 p.) 225 1 $aSecurity and Cryptology ;$v5758 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-04341-0 320 $aIncludes bibliographical references and index. 327 $aRecent Advances in Intrusion Detection Anomaly and Specification-Based Approaches -- Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems -- Protecting a Moving Target: Addressing Web Application Concept Drift -- Adaptive Anomaly Detection via Self-calibration and Dynamic Updating -- Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems -- Malware Detection and Prevention (I) -- Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language -- Automatic Generation of String Signatures for Malware Detection -- PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime -- Network and Host Intrusion Detection and Prevention -- Automatically Adapting a Trained Anomaly Detector to Software Patches -- Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration -- Automated Behavioral Fingerprinting -- Intrusion Detection for Mobile Devices -- SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection -- Keystroke-Based User Identification on Smart Phones -- VirusMeter: Preventing Your Cellphone from Spies -- High-Performance Intrusion Detection -- Regular Expression Matching on Graphics Hardware for Intrusion Detection -- Multi-byte Regular Expression Matching with Speculation -- Malware Detection and Prevention (II) -- Toward Revealing Kernel Malware Behavior in Virtual Execution Environments -- Exploiting Temporal Persistence to Detect Covert Botnet Channels -- Posters -- An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection -- Automatic Software Instrumentation for the Detection of Non-control-data Attacks -- BLADE: Slashing the Invisible Channel of Drive-by Download Malware -- CERN Investigation of Network Behaviour and Anomaly Detection -- Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy -- Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach -- Autonomic Intrusion Detection System -- ALICE@home: Distributed Framework for Detecting Malicious Sites -- Packet Space Analysis of Intrusion Detection Signatures -- Traffic Behaviour Characterization Using NetMate -- On the Inefficient Use of Entropy for Anomaly Detection -- Browser-Based Intrusion Prevention System -- Using Formal Grammar and Genetic Operators to Evolve Malware -- Method for Detecting Unknown Malicious Executables -- Brave New World: Pervasive Insecurity of Embedded Network Devices -- DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. 330 $aThis book constitutes the refereed proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID 2009, held in Saint-Malo, Brittany, France, in September 2009. The 17 revised full papers presented together with 16 revised poster papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on anomaly and specification-based approaches, malware detection and prevention, network and host intrusion detection and prvention, intrusion detection for mobile devices, and high-performance intrusion detection. 410 0$aSecurity and Cryptology ;$v5758 606 $aManagement information systems 606 $aComputer science 606 $aUser interfaces (Computer systems) 606 $aComputers and civilization 606 $aBiometrics (Biology) 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aUser Interfaces and Human Computer Interaction$3https://scigraph.springernature.com/ontologies/product-market-codes/I18067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aBiometrics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 608 $aKongress.$2swd 608 $aSaint-Malo (2009)$2swd 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aUser interfaces (Computer systems). 615 0$aComputers and civilization. 615 0$aBiometrics (Biology). 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 14$aManagement of Computing and Information Systems. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aComputers and Society. 615 24$aBiometrics. 615 24$aCryptology. 615 24$aComputer Communication Networks. 676 $a005.8 686 $aDAT 055f$2stub 686 $aDAT 460f$2stub 686 $aSS 4800$2rvk 702 $aKirda$b Engin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJha$b Somesh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBalzarotti$b Davide$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465339403316 996 $aRecent Advances in Intrusion Detection$9772673 997 $aUNISA LEADER 00879nam0 22002531i 450 001 UON00351859 005 20231205104345.8 100 $a20100217d1973 |0itac50 ba 101 $aslo 102 $aSK 105 $a|||| 1|||| 200 1 $aUroda$fAndrej Plávka 210 $aBratislava$cSlovensky spisovatel'$d1973 215 $a353 p.$d21 cm. 620 $aSK$dBratislava$3UONL000503 676 $a891.87$cLetteratura slovacca$v21 700 1$aPLAVKA$bAndrej$3UONV144529$0688422 712 $aSlovensky spisovatel'$3UONV271126$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00351859 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI SLOVACCO A 0382 $eSI EO 1387 5 0382 996 $aUroda$91356460 997 $aUNIOR