11. RAID 2008:
Cambridge,
MA,
USA
Richard Lippmann, Engin Kirda, Ari Trachtenberg (Eds.):
Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings.
Lecture Notes in Computer Science 5230 Springer 2008, ISBN 978-3-540-87402-7
Rootkit Prevention
Malware Detection and Prevention
- Abhinav Srivastava, Jonathon T. Giffin:
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections.
39-58
- Daniel Ramsbrock, Xinyuan Wang, Xuxian Jiang:
A First Step towards Live Botmaster Traceback.
59-77
- Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors.
78-97
- Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh:
A Study of the Packer Problem and Its Solutions.
98-115
High Performance Intrusion Detection and Evasion
Web Application Testing and Evasion
Alert Correlation and Worm Detection
- Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe:
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
231-250
- M. Patrick Collins, Michael K. Reiter:
On the Limits of Payload-Oblivious Network Attack Detection.
251-270
- Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon:
Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling.
271-290
- Magnus Almgren, Ulf Lindqvist, Erland Jonsson:
A Multi-Sensor Model to Improve Automated Attack Detection.
291-310
Anomaly Detection and Network Traffic Analysis
- Mohamed Nassar, Radu State, Olivier Festor:
Monitoring SIP Traffic Using Support Vector Machines.
311-330
- Kevin S. Killourhy, Roy A. Maxion:
The Effect of Clock Resolution on Keystroke Dynamics.
331-350
- Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam:
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks.
351-371
- Humberto J. Abdelnur, Radu State, Olivier Festor:
Advanced Network Fingerprinting.
372-389
Posters
- Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
On Evaluation of Response Cost for Intrusion Response Systems.
390-391
- Nathalie Dagorn:
WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract).
392-393
- Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar:
Evading Anomaly Detection through Variance Injection Attacks on PCA.
394-395
- Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan:
Anticipating Hidden Text Salting in Emails.
396-397
- Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek:
Improving Anomaly Detection Error Rate by Collective Trust Modeling.
398-399
- Ashish Kamra, Elisa Bertino:
Database Intrusion Detection and Response.
400-401
- Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim:
An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract).
402-403
- Junsup Lee, Sung Deok Cha:
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract).
404-405
- Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier:
Automating the Analysis of Honeypot Data (Extended Abstract).
406-407
- Paul Rubel, Partha Pratim Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber:
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response.
408-409
- Andrew Brown, Mark Ryan:
Monitoring the Execution of Third-Party Software on Mobile Devices.
410-411
- Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina:
Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).
412-414
- Wei Lu, Ali A. Ghorbani:
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract).
415-416
- Lorenzo Cavallaro, R. Sekar:
Anomalous Taint Detection.
417-418
- Divya Jain, K. Vasanta Lakshmi, Priti Shankar:
Deep Packet Inspection Using Message Passing Networks.
419-420
- Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin:
System Call API Obfuscation (Extended Abstract).
421-422
Copyright © Sun Mar 14 23:22:15 2010
by Michael Ley (ley@uni-trier.de)