Skip to main content
  • Conference proceedings
  • © 2007

Recent Advances in Intrusion Detection

10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4637)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

  2. Host-Based Intrusion Detection

    1. Exploiting Execution Context for the Detection of Anomalous System Calls

      • Darren Mutz, William Robertson, Giovanni Vigna, Richard Kemmerer
      Pages 1-20
    2. Understanding Precision in Host Based Intrusion Detection

      • Monirul Sharif, Kapil Singh, Jonathon Giffin, Wenke Lee
      Pages 21-41
  3. Anomaly-Based Intrusion Detection

    1. Comparing Anomaly Detection Techniques for HTTP

      • Kenneth L. Ingham, Hajime Inoue
      Pages 42-62
    2. Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications

      • Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna
      Pages 63-86
  4. Network-Based Intrusion Detection and Response

    1. Emulation-Based Detection of Non-self-contained Polymorphic Shellcode

      • Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
      Pages 87-106
    2. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

      • Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney
      Pages 107-126
    3. Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks

      • Shiau-Huey Wang, Chinyang Henry Tseng, Karl Levitt, Matthew Bishop
      Pages 127-145
  5. Insider Detection and Alert Correlation

    1. elicit: A System for Detecting Insiders Who Violate Need-to-Know

      • Marcus A. Maloof, Gregory D. Stephens
      Pages 146-166
  6. Malicious Code Analysis

    1. Automated Classification and Analysis of Internet Malware

      • Michael Bailey, Jon Oberheide, Jon Andersen, Z. Morley Mao, Farnam Jahanian, Jose Nazario
      Pages 178-197
    2. A Forced Sampled Execution Approach to Kernel Rootkit Identification

      • Jeffrey Wilhelm, Tzi-cker Chiueh
      Pages 219-235
  7. Evasion

    1. Advanced Allergy Attacks: Does a Corpus Really Help?

      • Simon P. Chung, Aloysius K. Mok
      Pages 236-255
    2. Alert Verification Evasion Through Server Response Forging

      • Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers
      Pages 256-275
  8. Malicious Code Defense

    1. SpyShield: Preserving Privacy from Spy Add-Ons

      • Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
      Pages 296-316
    2. Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems

      • John R. Lange, Peter A. Dinda, Fabián E. Bustamante
      Pages 317-336
  9. Back Matter

Other Volumes

  1. Recent Advances in Intrusion Detection

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access