Buch, Englisch, 351 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1140 g
Reihe: Security and Cryptology
8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers
Buch, Englisch, 351 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1140 g
Reihe: Security and Cryptology
ISBN: 978-3-540-31778-4
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
Weitere Infos & Material
Worm Detection and Containment (I).- Virtual Playgrounds for Worm Behavior Investigation.- Empirical Analysis of Rate Limiting Mechanisms.- Anomaly Detection.- COTS Diversity Based Intrusion Detection and Application to Web Servers.- Behavioral Distance for Intrusion Detection.- Intrusion Prevention and Response.- FLIPS: Hybrid Adaptive Intrusion Prevention.- Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card.- Defending Against Injection Attacks Through Context-Sensitive String Evaluation.- System Call-Based Intrusion Detection.- Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks.- On Random-Inspection-Based Intrusion Detection.- Environment-Sensitive Intrusion Detection.- Worm Detection and Containment (II).- Polymorphic Worm Detection Using Structural Information of Executables.- Anomalous Payload-Based Worm Detection and Signature Generation.- Network-Based Intrusion Detection.- On Interactive Internet Traffic Replay.- Interactive Visualization for Network and Port Scan Detection.- A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows.- Mobile and Wireless Networks.- Sequence Number-Based MAC Address Spoof Detection.- A Specification-Based Intrusion Detection Model for OLSR.