000 05303nam a22006615i 4500
001 978-3-540-30143-1
003 DE-He213
005 20240423130227.0
007 cr nn 008mamaa
008 121227s2004 gw | s |||| 0|eng d
020 _a9783540301431
_9978-3-540-30143-1
024 7 _a10.1007/b100714
_2doi
050 4 _aQA76.9.M3
072 7 _aKJQ
_2bicssc
072 7 _aCOM039000
_2bisacsh
072 7 _aKJQ
_2thema
082 0 4 _a004.068
_223
245 1 0 _aRecent Advances in Intrusion Detection
_h[electronic resource] :
_b7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings /
_cedited by Erland Jonsson, Alfonso Valdes, Magnus Almgren.
250 _a1st ed. 2004.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2004.
300 _aX, 322 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v3224
505 0 _aModelling Process Behaviour -- Automatic Extraction of Accurate Application-Specific Sandboxing Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths -- Detecting Worms and Viruses -- HoneyStat: Local Worm Detection Using Honeypots -- Fast Detection of Scanning Worm Infections -- Detecting Unknown Massive Mailing Viruses Using Proactive Methods -- Attack and Alert Analysis -- Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection -- Attack Analysis and Detection for Ad Hoc Routing Protocols -- On the Design and Use of Internet Sinks for Network Abuse Monitoring -- Practical Experience -- Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information -- Symantec Deception Server Experience with a Commercial Deception System -- Anomaly Detection -- Anomalous Payload-Based Network Intrusion Detection -- Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix -- Seurat: A Pointillist Approach to Anomaly Detection -- Formal Analysis for Intrusion Detection -- Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds -- Formal Reasoning About Intrusion Detection Systems -- RheoStat: Real-Time Risk Management.
520 _aOn behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15–17, 2004. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial perspectives. We also encouraged discussions that - dressed issues that arise when studying intrusion detection, including infor- tion gathering and monitoring, from a wider perspective. Thus, we had sessions on detection of worms and viruses, attack analysis, and practical experience reports. The RAID 2004 Program Committee received 118 paper submissions from all over the world. All submissions were carefully reviewed by several members of the Program Committee and selection was made on the basis of scienti?c novelty, importance to the ?eld, and technical quality. Final selection took place at a meeting held May 24 in Paris, France. Fourteen papers and two practical experience reports were selected for presentation and publication in the conf- ence proceedings. In addition, a number of papers describing work in progress were selected for presentation at the symposium. The keynote addresswas given by Bruce Schneier of Counterpane Systems. H? akan Kvarnstrom ¨ of TeliaSonera gave an invited talk on the topic “Fighting Fraud in Telecom Environments. ” A successful symposium is the result of the joint e?ort of many people.
650 0 _aElectronic data processing
_xManagement.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData protection.
650 0 _aComputers and civilization.
650 0 _aComputer networks .
650 0 _aOperating systems (Computers).
650 1 4 _aIT Operations.
650 2 4 _aCryptology.
650 2 4 _aData and Information Security.
650 2 4 _aComputers and Society.
650 2 4 _aComputer Communication Networks.
650 2 4 _aOperating Systems.
700 1 _aJonsson, Erland.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aValdes, Alfonso.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aAlmgren, Magnus.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540231233
776 0 8 _iPrinted edition:
_z9783662197028
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v3224
856 4 0 _uhttps://doi.org/10.1007/b100714
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c186382
_d186382