This book constitutes the refereed proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection, RAID 2006, held in Hamburg, Germany in September 2006.
The 16 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.
Author(s): James J. Treinen, Ramakrishna Thurimella (auth.), Diego Zamboni, Christopher Kruegel (eds.)
Series: Lecture Notes in Computer Science 4219
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 331
Tags: Management of Computing and Information Systems; Computers and Society; Data Encryption; Computer Communication Networks; Operating Systems
Front Matter....Pages -
The Nepenthes Platform: An Efficient Approach to Collect Malware....Pages 165-184
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots....Pages 185-205
Fast and Evasive Attacks: Highlighting the Challenges Ahead....Pages 206-225
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack....Pages 226-248
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET....Pages 249-271
Enhancing Network Intrusion Detection with Integrated Sampling and Filtering....Pages 272-289
WIND: Workload-Aware INtrusion Detection....Pages 290-310
SafeCard: A Gigabit IPS on the Network Card....Pages 311-330
A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures....Pages 1-18
Behavioral Distance Measurement Using Hidden Markov Models....Pages 19-40
Automated Discovery of Mimicry Attacks....Pages 41-60
Allergy Attack Against Automatic Signature Generation....Pages 61-80
Paragraph: Thwarting Signature Learning by Training Maliciously....Pages 81-105
Anomaly Detector Performance Evaluation Using a Parameterized Environment....Pages 106-126
Ranking Attack Graphs....Pages 127-144
Using Hidden Markov Models to Evaluate the Risks of Intrusions....Pages 145-164
Back Matter....Pages -