Detection of Intrusions and Malware, and Vulnerability Assessment
Springer Berlin (Verlag)
9783540736134 (ISBN)
Web Security.- Extensible Web Browser Security.- On the Effectiveness of Techniques to Detect Phishing Sites.- Protecting the Intranet Against "JavaScript Malware" and Related Attacks.- Intrusion Detection.- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements.- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract).- Characterizing Bots' Remote Control Behavior.- Traffic Analysis.- Measurement and Analysis of Autonomous Spreading Malware in a University Environment.- Passive Monitoring of DNS Anomalies.- Characterizing Dark DNS Behavior.- Network Security.- Distributed Evasive Scan Techniques and Countermeasures.- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.- Host Security.- Targeting Physically Addressable Memory.- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks.- A Study of Malcode-Bearing Documents.
| Erscheint lt. Verlag | 5.7.2007 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | X, 254 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 405 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • Anomaly Detection • Audit Control • authentication • cryptographic algorithms • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • honeypots • Information-Hiding • Intrusion Detection • invasive software • Malware • Monitor • network intrusion • Network Security • Pattern Analysis • privacy • scan detection • SEC • Secure Communications • security • security flaws • traffic analysis • virtual security |
| ISBN-13 | 9783540736134 / 9783540736134 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich