LEADER 05807nam 22007575 450 001 996466167903316 005 20200704110949.0 010 $a3-540-31779-1 024 7 $a10.1007/11663812 035 $a(CKB)1000000000232797 035 $a(SSID)ssj0000319760 035 $a(PQKBManifestationID)11255739 035 $a(PQKBTitleCode)TC0000319760 035 $a(PQKBWorkID)10338747 035 $a(PQKB)11071315 035 $a(DE-He213)978-3-540-31779-1 035 $a(MiAaPQ)EBC3067946 035 $a(PPN)123131065 035 $a(EXLCZ)991000000000232797 100 $a20100419d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRecent Advances in Intrusion Detection$b[electronic resource] $e8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers /$fedited by Alfonso Valdes, Diego Zamboni 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (X, 351 p.) 225 1 $aSecurity and Cryptology ;$v3858 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-31778-3 320 $aIncludes bibliographical references and index. 327 $aWorm Detection and Containment (I) -- Virtual Playgrounds for Worm Behavior Investigation -- Empirical Analysis of Rate Limiting Mechanisms -- Anomaly Detection -- COTS Diversity Based Intrusion Detection and Application to Web Servers -- Behavioral Distance for Intrusion Detection -- Intrusion Prevention and Response -- FLIPS: Hybrid Adaptive Intrusion Prevention -- Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card -- Defending Against Injection Attacks Through Context-Sensitive String Evaluation -- System Call-Based Intrusion Detection -- Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks -- On Random-Inspection-Based Intrusion Detection -- Environment-Sensitive Intrusion Detection -- Worm Detection and Containment (II) -- Polymorphic Worm Detection Using Structural Information of Executables -- Anomalous Payload-Based Worm Detection and Signature Generation -- Network-Based Intrusion Detection -- On Interactive Internet Traffic Replay -- Interactive Visualization for Network and Port Scan Detection -- A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows -- Mobile and Wireless Networks -- Sequence Number-Based MAC Address Spoof Detection -- A Specification-Based Intrusion Detection Model for OLSR. 330 $aOn behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial prospectives. We also encouraged discussions that addressed issues that arise when studying intrusion detection, including monitoring, performance and validation, from a wider perspective. We had sessions on the detection and containment of Internet worm attacks, anomaly detection, automated response to intrusions, host-based intrusion detection using system calls, network intrusion detection, and intrusion detection, in mobile wireless networks. The RAID 2005 Program Committee received 83 paper submissions from all over the world. All submissions were carefully reviewed by several members of Program Committee and selection was made on the basis of scientific novelty, importance to the field, and technical quality. Final selection took place at a Program Committee meeting held on May 11 and 12 in Oakland, California. Fifteen papers and two practical experience reports were selected for presentation and publication in the conference proceedings. The keynote address was given by Phil Attfield of the Northwest Security Institute. 410 0$aSecurity and Cryptology ;$v3858 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 14$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aCryptology. 615 24$aComputers and Society. 676 $a005.8 702 $aValdes$b Alfonso$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZamboni$b Diego$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aRAID 2005 906 $aBOOK 912 $a996466167903316 996 $aRecent Advances in Intrusion Detection$9772673 997 $aUNISA