Skip to main content
  • Conference proceedings
  • © 2006

Recent Advances in Intrusion Detection

8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3858)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

  2. Worm Detection and Containment (I)

    1. Virtual Playgrounds for Worm Behavior Investigation

      • Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
      Pages 1-21
    2. Empirical Analysis of Rate Limiting Mechanisms

      • Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang
      Pages 22-42
  3. Anomaly Detection

    1. COTS Diversity Based Intrusion Detection and Application to Web Servers

      • Eric Totel, Frédéric Majorczyk, Ludovic Mé
      Pages 43-62
    2. Behavioral Distance for Intrusion Detection

      • Debin Gao, Michael K. Reiter, Dawn Song
      Pages 63-81
  4. Intrusion Prevention and Response

    1. FLIPS: Hybrid Adaptive Intrusion Prevention

      • Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 82-101
    2. Defending Against Injection Attacks Through Context-Sensitive String Evaluation

      • Tadeusz Pietraszek, Chris Vanden Berghe
      Pages 124-145
  5. System Call-Based Intrusion Detection

    1. On Random-Inspection-Based Intrusion Detection

      • Simon P. Chung, Aloysius K. Mok
      Pages 165-184
    2. Environment-Sensitive Intrusion Detection

      • Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
      Pages 185-206
  6. Worm Detection and Containment (II)

    1. Polymorphic Worm Detection Using Structural Information of Executables

      • Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna
      Pages 207-226
    2. Anomalous Payload-Based Worm Detection and Signature Generation

      • Ke Wang, Gabriela Cretu, Salvatore J. Stolfo
      Pages 227-246
  7. Network-Based Intrusion Detection

    1. On Interactive Internet Traffic Replay

      • Seung-Sun Hong, S. Felix Wu
      Pages 247-264
    2. Interactive Visualization for Network and Port Scan Detection

      • Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
      Pages 265-283
    3. A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows

      • Ramkumar Chinchani, Eric van den Berg
      Pages 284-308
  8. Mobile and Wireless Networks

    1. Sequence Number-Based MAC Address Spoof Detection

      • Fanglu Guo, Tzi-cker Chiueh
      Pages 309-329
    2. A Specification-Based Intrusion Detection Model for OLSR

      • Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl Levitt
      Pages 330-350
  9. Back Matter

Other Volumes

  1. Recent Advances in Intrusion Detection

About this book

On behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial prospectives. We also encouraged discussions that addressed issues that arise when studying intrusion detection, including monitoring, performance and validation, from a wider perspective. We had sessions on the detection and containment of Internet worm attacks, anomaly detection, automated response to intrusions, host-based intrusion detection using system calls, network intrusion detection, and intrusion detection, in mobile wireless networks. The RAID 2005 Program Committee received 83 paper submissions from all over the world. All submissions were carefully reviewed by several members of Program Committee and selection was made on the basis of scientific novelty, importance to the field, and technical quality. Final selection took place at a Program Committee meeting held on May 11 and 12 in Oakland, California. Fifteen papers and two practical experience reports were selected for presentation and publication in the conference proceedings. The keynote address was given by Phil Attfield of the Northwest Security Institute.

Editors and Affiliations

  • SRI International, Menlo Park, USA

    Alfonso Valdes

  • IBM Research Laboratory, Rüschlikon, Switzerland

    Diego Zamboni

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access