Skip to main content
  • Conference proceedings
  • © 2009

Proceedings of the 3rd European Conference on Computer Network Defense

  • Presents current research issues and solutions
  • Addresses security from multiple perspectives, including state-of-the-art research on computer network security, intrusion detection, denial-of-service, privacy protection, security policies, and incident response and management

Part of the book series: Lecture Notes in Electrical Engineering (LNEE, volume 30)

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (10 papers)

  1. Front Matter

    Pages I-XI
  2. Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting

    • Michael Valkering, Asia Slowinska, Herbert Bos
    Pages 1-20
  3. Towards High Assurance Networks of Virtual Machines

    • Fabrizio Baiardi, Daniele Sgandurra
    Pages 21-34
  4. Intrusion Detection Using Cost-Sensitive Classification

    • Aikaterini Mitrokotsa*, Christos Dimitrakakis, Christos Douligeris
    Pages 35-47
  5. A Novel Approach for Anomaly Detection over High-Speed Networks

    • Osman Salem, Sandrine Vaton, Annie Gravey
    Pages 49-68
  6. Elastic Block Ciphers in Practice: Constructions and Modes of Encryption

    • Debra L. Cook*, Moti Yung, Angelos D. Keromytis
    Pages 69-91
  7. Vulnerability Response Decision Assistance

    • Hal Burch, Art Manion, Yurie Ito
    Pages 93-105
  8. Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests

    • Nikos Nikiforakis, Andreas Makridakis, Elias Athanasopoulos, Evangelos P. Markatos
    Pages 107-117
  9. QuiGon: The First Tool Against Clone Attack on Internet Relay Chat

    • Thibaut Henin, Corinne Huguennet
    Pages 119-129
  10. Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction

    • Spiros Antonatos, Michael Locasto, Stelios Sidiroglou, Angelos D. Keromytis, Evangelos Markatos
    Pages 131-141
  11. Back Matter

    Pages 153-160

About this book

The 3rd European Conference on Computer Network Defense took place in September 2007 at Aldemar Hotel, in Heraklion, Crete, Greece in cooperation with the European Network and Information Security Agency (ENISA). The theme of the conference was the protection of computer networks. The conference drew participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. The conference was a great success, with 6 refereed papers and 6 invited presentations on topics ranging from high assurance networks of virtual machines to signaling vulnerabilities in wiretapping systems. This book contains the refereed as well as refereed papers. We are greatful to the authors and presenters for their contributions, as well as the participants of EC2N’07 for making the conference a success. We are looking forward to a successful EC2ND event in 2008. K. G. Anagnostakis, S. Ioannidis, V. Siris Contents 1 Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting ........................................1 Michael Valkering, Asia Slowinska, and Herbert Bos 1 Introduction ......................................................................................... 1 2 Architecture ......................................................................................... 3 2.1 Tracking Issues .............................................................................. 4 2.2 Retainting ...................................................................................... 6 2.2.1 Determining the Tag ............................................................. 6 2.2.2 Identifying the SSL Conversation ........................................ 8 2.3 Interposition Details...................................................................... 9 3 Signature Generation ........................................................................... 9 3.1 Pattern-Based Signatures ............................................................. 10 3.2 Signatures for Polymorphic Buffer Overflows ............................ 13 4 Filters ................................................................................................. 14 5 Results ............................................................................................... 15 6 Related Work ..................................................................................... 17 7 Conclusions ....................................................................................... 18 References ............................................................................................ 18 2 Towards High Assurance Networks of Virtual Machines...............21

Editors and Affiliations

  • Inst. Computer Science, Foundation for Research & Technology, Hellas, Iraklion, Greece

    Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis

  • European Network & Information Security Agency (ENISA), Iraklion, Greece

    Panagiotis Trimintzios

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access