default search action
10. RAID 2007: Gold Goast, Queensland, Australia
- Christopher Krügel, Richard Lippmann, Andrew J. Clark:
Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings. Lecture Notes in Computer Science 4637, Springer 2007, ISBN 978-3-540-74319-4
Host-Based Intrusion Detection
- Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer:
Exploiting Execution Context for the Detection of Anomalous System Calls. 1-20 - Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee:
Understanding Precision in Host Based Intrusion Detection. 21-41
Anomaly-Based Intrusion Detection
- Kenneth L. Ingham, Hajime Inoue:
Comparing Anomaly Detection Techniques for HTTP. 42-62 - Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna:
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. 63-86
Network-Based Intrusion Detection and Response
- Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. 87-106 - Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney:
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. 107-126 - Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop:
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. 127-145
Insider Detection and Alert Correlation
- Marcus A. Maloof, Gregory D. Stephens:
elicit: A System for Detecting Insiders Who Violate Need-to-Know. 146-166 - Federico Maggi, Stefano Zanero:
On the Use of Different Statistical Tests for Alert Correlation - Short Paper. 167-177
Malicious Code Analysis
- Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario:
Automated Classification and Analysis of Internet Malware. 178-197 - Xuxian Jiang, Xinyuan Wang:
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. 198-218 - Jeffrey Wilhelm, Tzi-cker Chiueh:
A Forced Sampled Execution Approach to Kernel Rootkit Identification. 219-235
Evasion
- Simon P. Chung, Aloysius K. Mok:
Advanced Allergy Attacks: Does a Corpus Really Help? 236-255 - Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers:
Alert Verification Evasion Through Server Response Forging. 256-275
Malicious Code Defense
- M. Patrick Collins, Michael K. Reiter:
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. 276-295 - Zhuowei Li, XiaoFeng Wang, Jong Youl Choi:
SpyShield: Preserving Privacy from Spy Add-Ons. 296-316 - John R. Lange, Peter A. Dinda, Fabián E. Bustamante:
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. 317-336
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.