Recent Advances in Intrusion Detection

7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings (Lecture Notes in Computer Science)

1 edition
  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by ImportBot
October 15, 2023 | History

Recent Advances in Intrusion Detection

7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings (Lecture Notes in Computer Science)

1 edition
  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15 - 17, 2004. Proceedings
Author: Erland Jonsson, Alfonso Valdes, Magnus Almgren
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-23123-3
DOI: 10.1007/b100714

Table of Contents:

  • Automatic Extraction of Accurate Application-Specific Sandboxing Policy
  • Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths
  • HoneyStat: Local Worm Detection Using Honeypots
  • Fast Detection of Scanning Worm Infections
  • Detecting Unknown Massive Mailing Viruses Using Proactive Methods
  • Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection
  • Attack Analysis and Detection for Ad Hoc Routing Protocols
  • On the Design and Use of Internet Sinks for Network Abuse Monitoring
  • Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information
  • Symantec Deception Server Experience with a Commercial Deception System
  • Anomalous Payload-Based Network Intrusion Detection
  • Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix
  • Seurat: A Pointillist Approach to Anomaly Detection
  • Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
  • Formal Reasoning About Intrusion Detection Systems
  • RheoStat: Real-Time Risk Management

Publish Date
Publisher
Springer
Language
English
Pages
315

Buy this book

Previews available in: English

Book Details


First Sentence

"Many computer security vulnerabilities arise from software bugs."

Classifications

Library of Congress
QA76.9.A25 R34 2004, QA75.5-76.95

The Physical Object

Format
Paperback
Number of pages
315
Dimensions
9 x 6 x 0.8 inches
Weight
1.1 pounds

ID Numbers

Open Library
OL9055002M
Internet Archive
recentadvancesin0000raid
ISBN 10
3540231234
ISBN 13
9783540231233
LCCN
2004111363
Goodreads
6870978

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
October 15, 2023 Edited by ImportBot import existing book
January 14, 2023 Edited by ImportBot import existing book
November 6, 2021 Edited by ImportBot import existing book
October 4, 2021 Edited by ImportBot import existing book
April 30, 2008 Created by an anonymous user Imported from amazon.com record