Proceedings of the 3rd European Conference on Computer Network Defense

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection.

The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense.

Author(s): Michael Valkering, Asia Slowinska (auth.), Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios (eds.)
Series: Lecture Notes in Electrical Engineering 30
Edition: 1
Publisher: Springer US
Year: 2009

Language: English
Pages: 166
Tags: Communications Engineering, Networks; Management of Computing and Information Systems; Computer Communication Networks; Performance and Reliability; Electrical Engineering; Computer Systems Organization and Communication Networks

Front Matter....Pages I-XI
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting....Pages 1-20
Towards High Assurance Networks of Virtual Machines....Pages 21-34
Intrusion Detection Using Cost-Sensitive Classification....Pages 35-47
A Novel Approach for Anomaly Detection over High-Speed Networks....Pages 49-68
Elastic Block Ciphers in Practice: Constructions and Modes of Encryption....Pages 69-91
Vulnerability Response Decision Assistance....Pages 93-105
Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests....Pages 107-117
QuiGon: The First Tool Against Clone Attack on Internet Relay Chat....Pages 119-129
Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction....Pages 131-141
ISi-LANA – A Secure Basic Architecture for Networks Connected to the Internet....Pages 143-151
Back Matter....Pages 153-160