第7回不正侵入検知シンポジウム集:RAID2004<br>Recent Advances in Intrusion Detection : 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings (Lecture Notes in Computer Science Bd.3224) (2004. XII, 315 p. 23,5 cm)

個数:

第7回不正侵入検知シンポジウム集:RAID2004
Recent Advances in Intrusion Detection : 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings (Lecture Notes in Computer Science Bd.3224) (2004. XII, 315 p. 23,5 cm)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 314 p.
  • 言語 ENG
  • 商品コード 9783540231233

基本説明

Organized in topical sections on modelling process behavior, detecting norms and viruses, attack and alert analysis, and more.

Full Description

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15-17, 2004. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial perspectives. We also encouraged discussions that - dressed issues that arise when studying intrusion detection, including infor- tion gathering and monitoring, from a wider perspective. Thus, we had sessions on detection of worms and viruses, attack analysis, and practical experience reports. The RAID 2004 Program Committee received 118 paper submissions from all over the world. All submissions were carefully reviewed by several members of the Program Committee and selection was made on the basis of scienti?c novelty, importance to the ?eld, and technical quality. Final selection took place at a meeting held May 24 in Paris, France. Fourteen papers and two practical experience reports were selected for presentation and publication in the conf- ence proceedings. In addition, a number of papers describing work in progress were selected for presentation at the symposium. The keynote addresswas given by Bruce Schneier of Counterpane Systems. H? akan Kvarnstrom ¨ of TeliaSonera gave an invited talk on the topic "Fighting Fraud in Telecom Environments. " A successful symposium is the result of the joint e?ort of many people.

Contents

Modelling Process Behaviour.- Automatic Extraction of Accurate Application-Specific Sandboxing Policy.- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths.- Detecting Worms and Viruses.- HoneyStat: Local Worm Detection Using Honeypots.- Fast Detection of Scanning Worm Infections.- Detecting Unknown Massive Mailing Viruses Using Proactive Methods.- Attack and Alert Analysis.- Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection.- Attack Analysis and Detection for Ad Hoc Routing Protocols.- On the Design and Use of Internet Sinks for Network Abuse Monitoring.- Practical Experience.- Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information.- Symantec Deception Server Experience with a Commercial Deception System.- Anomaly Detection.- Anomalous Payload-Based Network Intrusion Detection.- Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix.- Seurat: A Pointillist Approach to Anomaly Detection.- Formal Analysis for Intrusion Detection.- Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds.- Formal Reasoning About Intrusion Detection Systems.- RheoStat: Real-Time Risk Management.

最近チェックした商品