Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, held in Ottawa, Canada, in September 2010. The 24 revised full papers presented together with 15 revised poster papers were carefully reviewed and selected from 102 submissions. The papers are organized in topical sections on network protection, high performance, malware detection and defence, evaluation, forensics, anomaly detection as well as web security.

Author(s): Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam (auth.), Somesh Jha, Robin Sommer, Christian Kreibich (eds.)
Series: Lecture Notes in Computer Science 6307 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 524
Tags: Computer Communication Networks; Data Encryption; Computers and Society; Algorithm Analysis and Problem Complexity; Data Structures, Cryptology and Information Theory; Artificial Intelligence (incl. Robotics)

Front Matter....Pages -
What Is the Impact of P2P Traffic on Anomaly Detection?....Pages 1-17
A Centralized Monitoring Infrastructure for Improving DNS Security....Pages 18-37
Behavior-Based Worm Detectors Compared....Pages 38-57
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams....Pages 58-78
GrAVity: A Massively Parallel Antivirus Engine....Pages 79-96
Automatic Discovery of Parasitic Malware....Pages 97-117
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection....Pages 118-137
CANVuS: Context-Aware Network Vulnerability Scanning....Pages 138-157
HyperCheck: A Hardware-Assisted Integrity Monitor....Pages 158-177
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory....Pages 178-197
Bait Your Hook: A Novel Detection Technique for Keyloggers....Pages 198-217
Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security....Pages 218-237
On Challenges in Evaluating Malware Clustering....Pages 238-255
Why Did My Detector Do That ?!....Pages 256-276
NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring....Pages 277-296
Live and Trustworthy Forensic Analysis of Commodity Production Systems....Pages 297-316
Hybrid Analysis and Control of Malware....Pages 317-338
Anomaly Detection and Mitigation for Disaster Area Networks....Pages 339-359
Community Epidemic Detection Using Time-Correlated Anomalies....Pages 360-381
A Data-Centric Approach to Insider Attack Detection in Database Systems....Pages 382-401
Privilege States Based Access Control for Fine-Grained Intrusion Response....Pages 402-421
Abusing Social Networks for Automated User Profiling....Pages 422-441
An Analysis of Rogue AV Campaigns....Pages 442-463
Fast-Flux Bot Detection in Real Time....Pages 464-483
A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery....Pages 484-485
A Distributed Honeynet at KFUPM: A Case Study....Pages 486-487
Aspect-Based Attack Detection in Large-Scale Networks....Pages 488-489
Detecting Network Anomalies in Backbone Networks....Pages 490-491
Detecting the Onset of Infection for Secure Hosts....Pages 492-493
Eliminating Human Specification in Static Analysis....Pages 494-495
Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009....Pages 496-497
Inferring Protocol State Machine from Real-World Trace....Pages 498-499
MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA....Pages 500-501
On Estimating Cyber Adversaries’ Capabilities: A Bayesian Model Approach....Pages 502-504
Security System for Encrypted Environments (S2E2)....Pages 505-507
Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence....Pages 508-509
Toward Specification-Based Intrusion Detection for Web Applications....Pages 510-511
Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices....Pages 512-513
Using IRP for Malware Detection....Pages 514-515
Back Matter....Pages -