RAID A

18 papers

YearTitle / Authors
2007"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots.
Xuxian Jiang, Xinyuan Wang
2007A Forced Sampled Execution Approach to Kernel Rootkit Identification.
Jeffrey Wilhelm, Tzi-cker Chiueh
2007Advanced Allergy Attacks: Does a Corpus Really Help?
Simon P. Chung, Aloysius K. Mok
2007Alert Verification Evasion Through Server Response Forging.
Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers
2007Automated Classification and Analysis of Internet Malware.
Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario
2007Comparing Anomaly Detection Techniques for HTTP.
Kenneth L. Ingham, Hajime Inoue
2007Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks.
Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop
2007Emulation-Based Detection of Non-self-contained Polymorphic Shellcode.
Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
2007Exploiting Execution Context for the Detection of Anomalous System Calls.
Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer
2007Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs.
M. Patrick Collins, Michael K. Reiter
2007On the Use of Different Statistical Tests for Alert Correlation - Short Paper.
Federico Maggi, Stefano Zanero
2007Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings
Christopher Krügel, Richard Lippmann, Andrew J. Clark
2007SpyShield: Preserving Privacy from Spy Add-Ons.
Zhuowei Li, Xiaofeng Wang, Jong Youl Choi
2007Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.
Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna
2007The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney
2007Understanding Precision in Host Based Intrusion Detection.
Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee
2007Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.
John R. Lange, Peter A. Dinda, Fabián E. Bustamante
2007elicit: A System for Detecting Insiders Who Violate Need-to-Know.
Marcus A. Maloof, Gregory D. Stephens