Vai al contenuto principale della pagina

Research in Attacks, Intrusions and Defenses [[electronic resource] ] : 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedings / / edited by Davide Balzarotti, Salvatore J. Stolfo, Marco Cova



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Research in Attacks, Intrusions and Defenses [[electronic resource] ] : 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedings / / edited by Davide Balzarotti, Salvatore J. Stolfo, Marco Cova Visualizza cluster
Pubblicazione: Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Edizione: 1st ed. 2012.
Descrizione fisica: 1 online resource (XIV, 400 p. 119 illus.)
Disciplina: 005.8
Soggetto topico: Computer security
Computer communication systems
Operating systems (Computers)
Programming languages (Electronic computers)
E-commerce
Application software
Systems and Data Security
Computer Communication Networks
Operating Systems
Programming Languages, Compilers, Interpreters
e-Commerce/e-business
Information Systems Applications (incl. Internet)
Persona (resp. second.): BalzarottiDavide
StolfoSalvatore J
CovaMarco
Note generali: International conference proceedings.
Nota di bibliografia: Includes bibliographical references and author index.
Nota di contenuto: Virtualization -- Trusted VM Snapshots in Untrusted Cloud Infrastructures -- Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection -- Assessing the Trustworthiness of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat -- Memory Errors: The Past, the Present, and the Future -- A Memory Access Validation Scheme against Payload Injection Attacks -- Host and Network Security Dione:A Flexible Disk Monitoring and Analysis Framework -- AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks -- Fraud Detection and Underground Economy -- Paying for Piracy? An Analysis of One-Click Hosters’ Controversial Reward Scheme -- Proactive Discovery of Phishing Related Domain Names -- Evaluating Electricity Theft Detectors in Smart Grid Networks -- Web Security --  PoisonAmplifier:A Guided Approach of Discovering Compromised -- Websites through Reversing Search Poisoning Attacks -- DEMACRO:Defense against Malicious Cross-Domain Requests -- FlashDetect:ActionScript 3 Malware Detection -- Intrusion Detection -- ALERT-ID:Analyze Logs of the Network Element in Real Time for Intrusion Detection -- A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence -- GPP-Grep:High-Speed Regular Expression Processing Engine on General Purpose Processors -- N-Gram against the Machine:On the Feasibility of the N-Gram -- Network Analysis for Binary Protocols -- Poster Abstracts -- Online Social Networks, a Criminals Multipurpose Toolbox -- The Triple-Channel Model:Toward Robust and Efficient Advanced Botnets -- Network Security Analysis Method Taking into Account the Usage Information -- Automatic Covert Channel Detection in Asbestos System -- EFA for Efficient Regular Expression Matching in NIDS -- Distress Detection -- Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System -- Towards Automated Forensic Event Reconstruction of Malicious Code -- Accurate Recovery of Functions in a Retargetable Decompiler -- Improvement of an Anagram Based NIDS by Reducing the Storage -- Space of Bloom Filters -- Concurrency Optimization for NIDS -- Malware Detection System by Payload Analysis of Network Traffic.
Sommario/riassunto: This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.
Titolo autorizzato: Research in Attacks, Intrusions, and Defenses  Visualizza cluster
ISBN: 3-642-33338-9
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996465474903316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilitĂ  qui
Serie: Security and Cryptology ; ; 7462