Skip to main content
  • Conference proceedings
  • © 2010

Recent Advances in Intrusion Detection

13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings

  • up-to-date results

  • fast track conference proceedings

  • state-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6307)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2010.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (39 papers)

  1. Front Matter

  2. Network Protection

    1. What Is the Impact of P2P Traffic on Anomaly Detection?

      • Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam
      Pages 1-17
    2. A Centralized Monitoring Infrastructure for Improving DNS Security

      • Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor
      Pages 18-37
    3. Behavior-Based Worm Detectors Compared

      • Shad Stafford, Jun Li
      Pages 38-57
  3. High Performance

    1. Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams

      • Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Smith
      Pages 58-78
    2. GrAVity: A Massively Parallel Antivirus Engine

      • Giorgos Vasiliadis, Sotiris Ioannidis
      Pages 79-96
  4. Malware Detection and Defence

    1. Automatic Discovery of Parasitic Malware

      • Abhinav Srivastava, Jonathon Giffin
      Pages 97-117
    2. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection

      • Brian M. Bowen, Pratap Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 118-137
    3. CANVuS: Context-Aware Network Vulnerability Scanning

      • Yunjing Xu, Michael Bailey, Eric Vander Weele, Farnam Jahanian
      Pages 138-157
    4. HyperCheck: A Hardware-Assisted Integrity Monitor

      • Jiang Wang, Angelos Stavrou, Anup Ghosh
      Pages 158-177
    5. Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory

      • Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jiang
      Pages 178-197
    6. Bait Your Hook: A Novel Detection Technique for Keyloggers

      • Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo
      Pages 198-217
  5. Evaluation

    1. Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security

      • Charles V. Wright, Christopher Connelly, Timothy Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham
      Pages 218-237
    2. On Challenges in Evaluating Malware Clustering

      • Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
      Pages 238-255
    3. Why Did My Detector Do That?!

      • Kevin Killourhy, Roy Maxion
      Pages 256-276
  6. Forensics

    1. Live and Trustworthy Forensic Analysis of Commodity Production Systems

      • Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro
      Pages 297-316
    2. Hybrid Analysis and Control of Malware

      • Kevin A. Roundy, Barton P. Miller
      Pages 317-338
  7. Anomaly Detection

    1. Anomaly Detection and Mitigation for Disaster Area Networks

      • Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani
      Pages 339-359
    2. Community Epidemic Detection Using Time-Correlated Anomalies

      • Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
      Pages 360-381

Other Volumes

  1. Recent Advances in Intrusion Detection

Keywords

  • Protection
  • access protection
  • artificial intelligence
  • digital biometrics
  • firewall
  • intrusion detection
  • network protection
  • security
  • tar
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Computer Sciences Department, University of Wisconsin, Madison, USA

    Somesh Jha

  • International Computer Science Institute, Berkeley, USA

    Robin Sommer, Christian Kreibich

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions