病毒入侵监测与安全弱点评估/Detection of intrusions and malware & vulnerability assessment
![病毒入侵监测与安全弱点评估/Detection of intrusions and malware & vulnerability assessment](http://image.wangchao.net.cn/small/product/1236125898965.jpg)
分類: 图书,进口原版书,科学与技术 Science & Techology ,
作者: Roland Büschkes 著
出 版 社: 湖北辞书出版社
出版时间: 2006-12-1字数:版次: 1页数: 194印刷时间: 2006/12/01开本:印次:纸张: 胶版纸I S B N : 9783540360148包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science resarch forum available.
The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material publised traditionally includes.
-proceedings(published in time for the respective conference)
-post-proceedings(consisting of thoroughly revised final full papers)
-research monographs(which may be basde on outstanding PhD work,research projects,technical reports,etc.).
内容简介
This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in July 2006. The 11 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on code analysis, intrusion detection, threat protection and response, malware and forensics, and deployment scenarios.
目录
Code Analysis
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs
Using Static Program Analysis to Aid Intrusion Detection
Intrusion Detection
An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix
Network-Level Polymorphic Shellcode Detection Using Emulation
Detecting Unknown Network Attacks Using Language Models
Threat Protection and Response
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Using Contextual Security Policies for Threat Response
Malware and Forensics
Detecting Self-mutating Malware Using Control-Flow Graph Matching
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe
Deployment Scenarios
A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance
Author Index