RAID A

37 papers

YearTitle / Authors
2008A Comparative Evaluation of Anomaly Detectors under Portscan Attacks.
Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam
2008A First Step towards Live Botmaster Traceback.
Daniel Ramsbrock, Xinyuan Wang, Xuxian Jiang
2008A Layered Architecture for Detecting Malicious Behaviors.
Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell
2008A Multi-Sensor Model to Improve Automated Attack Detection.
Magnus Almgren, Ulf Lindqvist, Erland Jonsson
2008A Study of the Packer Problem and Its Solutions.
Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh
2008Advanced Network Fingerprinting.
Humberto J. Abdelnur, Radu State, Olivier Festor
2008An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract).
Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim
2008Anomalous Taint Detection.
Lorenzo Cavallaro, R. Sekar
2008Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response.
Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber
2008Anticipating Hidden Text Salting in Emails.
Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan
2008Automating the Analysis of Honeypot Data (Extended Abstract).
Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier
2008Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract).
Wei Lu, Ali A. Ghorbani
2008Countering Persistent Kernel Rootkits through Systematic Hook Discovery.
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang
2008Database Intrusion Detection and Response.
Ashish Kamra, Elisa Bertino
2008Deep Packet Inspection Using Message Passing Networks.
Divya Jain, K. Vasanta Lakshmi, Priti Shankar
2008Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling.
Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon
2008Evading Anomaly Detection through Variance Injection Attacks on PCA.
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-Hon Lau, Nina Taft, J. Doug Tygar
2008Gnort: High Performance Network Intrusion Detection Using Graphics Processors.
Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis
2008Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.
Ryan D. Riley, Xuxian Jiang, Dongyan Xu
2008High-Speed Matching of Vulnerability Signatures.
Nabil Schear, David R. Albrecht, Nikita Borisov
2008Improving Anomaly Detection Error Rate by Collective Trust Modeling.
Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek
2008Leveraging User Interactions for In-Depth Testing of Web Applications.
Sean McAllister, Engin Kirda, Christopher Kruegel
2008Model-Based Covert Timing Channels: Automated Modeling and Evasion.
Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia
2008Monitoring SIP Traffic Using Support Vector Machines.
Mohamed Nassar, Radu State, Olivier Festor
2008Monitoring the Execution of Third-Party Software on Mobile Devices.
Andrew Brown, Mark Ryan
2008On Evaluation of Response Cost for Intrusion Response Systems.
Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong
2008On the Limits of Payload-Oblivious Network Attack Detection.
M. Patrick Collins, Michael K. Reiter
2008Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe
2008Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract).
Junsup Lee, Sung Deok Cha
2008Predicting the Resource Consumption of Network Intrusion Detection Systems.
Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer
2008Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings
Richard Lippmann, Engin Kirda, Ari Trachtenberg
2008Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).
Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina
2008Swarm Attacks against Network-Level Emulation/Analysis.
Simon P. Chung, Aloysius K. Mok
2008System Call API Obfuscation (Extended Abstract).
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin
2008Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections.
Abhinav Srivastava, Jonathon T. Giffin
2008The Effect of Clock Resolution on Keystroke Dynamics.
Kevin S. Killourhy, Roy A. Maxion
2008WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract).
Nathalie Dagorn