Buch, Englisch, Band 6307, 524 Seiten, Gewicht: 796 g
13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings
Buch, Englisch, Band 6307, 524 Seiten, Gewicht: 796 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-642-15511-6
Verlag: Springer
The papers are organized in topical sections on network protection, high performance, malware detection and defence, evaluation, forensics, anomaly detection as well as web security.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
Weitere Infos & Material
Network Protection.- What Is the Impact of P2P Traffic on Anomaly Detection?.- A Centralized Monitoring Infrastructure for Improving DNS Security.- Behavior-Based Worm Detectors Compared.- High Performance.- Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams.- GrAVity: A Massively Parallel Antivirus Engine.- Malware Detection and Defence.- Automatic Discovery of Parasitic Malware.- BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.- CANVuS: Context-Aware Network Vulnerability Scanning.- HyperCheck: A Hardware-Assisted Integrity Monitor.- Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.- Bait Your Hook: A Novel Detection Technique for Keyloggers.- Evaluation.- Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security.- On Challenges in Evaluating Malware Clustering.- Why Did My Detector Do That?!.- Forensics.- NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring.- Live and Trustworthy Forensic Analysis of Commodity Production Systems.- Hybrid Analysis and Control of Malware.- Anomaly Detection.- Anomaly Detection and Mitigation for Disaster Area Networks.- Community Epidemic Detection Using Time-Correlated Anomalies.- A Data-Centric Approach to Insider Attack Detection in Database Systems.- Privilege States Based Access Control for Fine-Grained Intrusion Response.- Web Security.- Abusing Social Networks for Automated User Profiling.- An Analysis of Rogue AV Campaigns.- Fast-Flux Bot Detection in Real Time.- Posters.- A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery.- A Distributed Honeynet at KFUPM: A Case Study.- Aspect-BasedAttack Detection in Large-Scale Networks.- Detecting Network Anomalies in Backbone Networks.- Detecting the Onset of Infection for Secure Hosts.- Eliminating Human Specification in Static Analysis.- Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009.- Inferring Protocol State Machine from Real-World Trace.- MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA.- On Estimating Cyber Adversaries’ Capabilities: A Bayesian Model Approach.- Security System for Encrypted Environments (S2E2).- Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence.- Toward Specification-Based Intrusion Detection for Web Applications.- Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices.- Using IRP for Malware Detection.