Darren Mutz, William Robertson, Giovanni Vigna, Richard Kemmerer (auth.), Christopher Kruegel, Richard Lippmann, Andrew Clark (eds.)3540743197, 9783540743194
The 17 revised full papers presented were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.
Table of contents :
Front Matter….Pages –
Exploiting Execution Context for the Detection of Anomalous System Calls….Pages 1-20
Understanding Precision in Host Based Intrusion Detection….Pages 21-41
Comparing Anomaly Detection Techniques for HTTP….Pages 42-62
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications….Pages 63-86
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode….Pages 87-106
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware….Pages 107-126
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks….Pages 127-145
elicit : A System for Detecting Insiders Who Violate Need-to-Know….Pages 146-166
On the Use of Different Statistical Tests for Alert Correlation – Short Paper….Pages 167-177
Automated Classification and Analysis of Internet Malware….Pages 178-197
“Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots….Pages 198-218
A Forced Sampled Execution Approach to Kernel Rootkit Identification….Pages 219-235
Advanced Allergy Attacks: Does a Corpus Really Help?….Pages 236-255
Alert Verification Evasion Through Server Response Forging….Pages 256-275
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs….Pages 276-295
SpyShield: Preserving Privacy from Spy Add-Ons….Pages 296-316
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems….Pages 317-336
Back Matter….Pages –
Reviews
There are no reviews yet.