Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings / [electronic resource] :
edited by Bernhard Hämmerli, Robin Sommer.
- 1st ed. 2007.
- X, 254 p. online resource.
- Security and Cryptology, 4579 2946-1863 ; .
- Security and Cryptology, 4579 .
Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against "JavaScript Malware" and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots' Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents.
9783540736141
10.1007/978-3-540-73614-1 doi
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Computer networks .
Data protection.
Computers and civilization.
Cryptology.
IT Operations.
Computer Communication Networks.
Data and Information Security.
Computers and Society.
QA268
005.824
Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against "JavaScript Malware" and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots' Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents.
9783540736141
10.1007/978-3-540-73614-1 doi
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Computer networks .
Data protection.
Computers and civilization.
Cryptology.
IT Operations.
Computer Communication Networks.
Data and Information Security.
Computers and Society.
QA268
005.824