Logo - springer
Slogan - springer

Computer Science - Software Engineering | Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Seattle, WA,

Recent Advances in Intrusion Detection

8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers

Valdes, Alfonso, Zamboni, Diego (Eds.)

2006, X, 351 p. Also available online.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$79.99

(net) price for USA

ISBN 978-3-540-31779-1

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$109.00

(net) price for USA

ISBN 978-3-540-31778-4

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

This book constitutes the refereed proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection, RAID 2005, held in Seattle, WA, USA in September 2005.

The 15 revised full papers presented together with two practical experience reports were carefully reviewed and selected from 83 submissions.

The papers are organized in topical sections on worm detection and containment, anomaly detection, intrusion prevention and response, intrusion detection based on system calls and network-based, as well as intrusion detection in mobile and wireless networks.

Content Level » Research

Keywords » Code - Information - Internet - RAID - anomaly detection - cryptographic attacks - intrusion detection - intrusion prevention - mimicry attacks - network intrusion - network security - port scan detection - privacy - secure communications - worm detection

Related subjects » Communication Networks - General Issues - Security and Cryptology - Software Engineering

Table of contents 

Worm Detection and Containment (I).- Virtual Playgrounds for Worm Behavior Investigation.- Empirical Analysis of Rate Limiting Mechanisms.- Anomaly Detection.- COTS Diversity Based Intrusion Detection and Application to Web Servers.- Behavioral Distance for Intrusion Detection.- Intrusion Prevention and Response.- FLIPS: Hybrid Adaptive Intrusion Prevention.- Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card.- Defending Against Injection Attacks Through Context-Sensitive String Evaluation.- System Call-Based Intrusion Detection.- Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks.- On Random-Inspection-Based Intrusion Detection.- Environment-Sensitive Intrusion Detection.- Worm Detection and Containment (II).- Polymorphic Worm Detection Using Structural Information of Executables.- Anomalous Payload-Based Worm Detection and Signature Generation.- Network-Based Intrusion Detection.- On Interactive Internet Traffic Replay.- Interactive Visualization for Network and Port Scan Detection.- A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows.- Mobile and Wireless Networks.- Sequence Number-Based MAC Address Spoof Detection.- A Specification-Based Intrusion Detection Model for OLSR.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Management of Computing and Information Systems.