Recent Advances in Intrusion Detection
Springer Berlin (Verlag)
978-3-540-23123-3 (ISBN)
Modelling Process Behaviour.- Automatic Extraction of Accurate Application-Specific Sandboxing Policy.- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths.- Detecting Worms and Viruses.- HoneyStat: Local Worm Detection Using Honeypots.- Fast Detection of Scanning Worm Infections.- Detecting Unknown Massive Mailing Viruses Using Proactive Methods.- Attack and Alert Analysis.- Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection.- Attack Analysis and Detection for Ad Hoc Routing Protocols.- On the Design and Use of Internet Sinks for Network Abuse Monitoring.- Practical Experience.- Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information.- Symantec Deception Server Experience with a Commercial Deception System.- Anomaly Detection.- Anomalous Payload-Based Network Intrusion Detection.- Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix.- Seurat: A Pointillist Approach to Anomaly Detection.- Formal Analysis for Intrusion Detection.- Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds.- Formal Reasoning About Intrusion Detection Systems.- RheoStat: Real-Time Risk Management.
Erscheint lt. Verlag | 7.9.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | X, 322 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 520 g |
Themenwelt | Informatik ► Software Entwicklung ► User Interfaces (HCI) |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
Schlagworte | anomality detection • Audit Control • cryptrographic attacks • deception systems • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Internet • Intrusion Detection • Intrusion Prevention • log-data analysis • Monitor • network intrusion • Network Security • privacy • RAID • risk mamagement • Routing • Secure Communications • security |
ISBN-10 | 3-540-23123-4 / 3540231234 |
ISBN-13 | 978-3-540-23123-3 / 9783540231233 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich