Detection of Intrusions and Malware, and Vulnerability Assessment
Springer Berlin (Verlag)
978-3-540-73613-4 (ISBN)
Web Security.- Extensible Web Browser Security.- On the Effectiveness of Techniques to Detect Phishing Sites.- Protecting the Intranet Against "JavaScript Malware" and Related Attacks.- Intrusion Detection.- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements.- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract).- Characterizing Bots' Remote Control Behavior.- Traffic Analysis.- Measurement and Analysis of Autonomous Spreading Malware in a University Environment.- Passive Monitoring of DNS Anomalies.- Characterizing Dark DNS Behavior.- Network Security.- Distributed Evasive Scan Techniques and Countermeasures.- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.- Host Security.- Targeting Physically Addressable Memory.- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks.- A Study of Malcode-Bearing Documents.
Erscheint lt. Verlag | 5.7.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 254 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 405 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Anomaly Detection • Audit Control • authentication • cryptographic algorithms • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • honeypots • Information-Hiding • Intrusion Detection • invasive software • Malware • Monitor • network intrusion • Network Security • Pattern Analysis • privacy • scan detection • SEC • Secure Communications • security • security flaws • traffic analysis • virtual security |
ISBN-10 | 3-540-73613-1 / 3540736131 |
ISBN-13 | 978-3-540-73613-4 / 9783540736134 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich