Detection of intrusions and malware & vulnerability assessment : third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006 : proceedings / / Roland Buschkes, Pavel Laskov (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, : Springer, 2006 |
Descrizione fisica | 1 online resource (X, 195 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BuschkesRoland
LaskovPavel |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computers - Access control
Computers - Access control - Evaluation Computer networks - Security measures Computer security |
ISBN | 3-540-36017-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Code Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network–Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance. |
Altri titoli varianti |
Detection of intrusions and malware and vulnerability assessment
DIMVA 2006 |
Record Nr. | UNINA-9910483354803321 |
Berlin, : Springer, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of intrusions and malware, and vulnerability assessment : 6th international conference, DIMVA 2009, Como, Italy, July 9-10, 2009 : proceedings / / Ulrich Flegel, Danilo Bruschi (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2009 |
Descrizione fisica | 1 online resource (X, 225 p.) |
Disciplina | 004n/a |
Altri autori (Persone) |
BruschiDanilo
FlegelUlrich |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computer networks - Security measures
Computer security Computers - Access control Computers - Access control - Evaluation Malware (Computer software) |
ISBN | 3-642-02918-3 |
Classificazione |
DAT 460f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection. |
Record Nr. | UNINA-9910484356103321 |
Berlin ; ; New York, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of intrusions and malware, and vulnerability assessment : 5th international conference, DIMVA 2008, Paris, France, July 10-11, 2008 : proceedings / / Diego Zamboni (ed.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, : Springer, 2008 |
Descrizione fisica | 1 online resource (X, 279 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | ZamboniDiego |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computers - Access control
Computers - Access control - Evaluation Computer networks - Security measures Computer security Malware (Computer software) |
ISBN | 3-540-70542-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attack Prevention -- Data Space Randomization -- XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks -- VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges -- Malware Detection and Prevention (I) -- Dynamic Binary Instrumentation-Based Framework for Malware Defense -- Embedded Malware Detection Using Markov n-Grams -- Learning and Classification of Malware Behavior -- Attack Techniques and Vulnerability Assessment -- On Race Vulnerabilities in Web Applications -- On the Limits of Information Flow Techniques for Malware Analysis and Containment -- Malware Detection and Prevention (II) -- Expanding Malware Defense by Securing Software Installations -- FluXOR: Detecting and Monitoring Fast-Flux Service Networks -- Traffic Aggregation for Malware Detection -- Intrusion Detection and Activity Correlation -- The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors -- The Quest for Multi-headed Worms -- A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. |
Altri titoli varianti | DIMVA 2008 |
Record Nr. | UNINA-9910483218503321 |
Berlin, : Springer, 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (X, 254 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Computers - Access control - Evaluation Computer networks - Security measures |
ISBN | 3-540-73614-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against “JavaScript Malware” and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots’ Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents. |
Record Nr. | UNINA-9910484973703321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (X, 254 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Computers - Access control - Evaluation Computer networks - Security measures |
ISBN | 3-540-73614-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against “JavaScript Malware” and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots’ Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents. |
Record Nr. | UNISA-996466117903316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Network security assessment : know your network / / Chris McNab |
Autore | McNab Chris (Chris R.), <1980-> |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Beijing, : O'Reilly, 2016 |
Descrizione fisica | 1 online resource (xix, 470 p.) : ill |
Disciplina | 005.82 |
Soggetto topico |
Computers - Access control - Evaluation
Computer networks - Security measures - Evaluation |
ISBN |
9781491911068 (ebook)
9781491910955 (pbk.) 9781491911051 1491911050 9781491911044 1491911042 9781491911068 1491911069 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Itroduction to network security assessment -- 2. Assessment workflow and tools -- 3. Vulnerabilities and adversaries -- 4. Internet network discovery -- 5. Local network discovery -- 6. IP network scanning -- 7. Assessing common network services -- 8. Assessing Microsoft services -- 9. Assessing mail services -- 10. Assessing VPN services -- 11. Assessing TLS services -- 12. Web application architecture -- 13. Assessing web servers -- 14. Assessing web application frameworks -- 15. Assessing data stores -- A. Common Ports and Message Types -- B. Sources of Vulnerability Information -- C. Unsafe TLS Cipher Suites -- Glossary of terms -- Index. |
Record Nr. | UNINA-9910155150503321 |
McNab Chris (Chris R.), <1980-> | ||
Beijing, : O'Reilly, 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|