Probabilistic Identification for Hard to Classify Protocol
With the growing use of protocols obfuscation techniques, protocol identification for Q.O.S enforcement, traffic prohibition, and intrusion detection has became a complex task. This paper address this issue with a probabilistic identification analysis tha
- PDF / 5,134,709 Bytes
- 161 Pages / 430 x 660 pts Page_size
- 22 Downloads / 206 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
5019
Jose A. Onieva Damien Sauveron Serge Chaumette Dieter Gollmann Konstantinos Markantonakis (Eds.)
Information Security Theory and Practices Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008 Seville, Spain, May 13-16, 2008 Proceedings
13
Volume Editors Jose A. Onieva University of Malaga, 29071 Malaga, Spain E-mail: [email protected] Damien Sauveron Université de Limoges/CNRS, 87000 Limoges, France E-mail: [email protected] Serge Chaumette Université Bordeaux 1/CNRS, 33405 Talence Cedex, France E-mail: [email protected] Dieter Gollmann Hamburg University of Technology, 21071 Hamburg, Germany E-mail: [email protected] Konstantinos Markantonakis University of London, Egham,TW20 0EX, UK E-mail: [email protected]
Library of Congress Control Number: 2008926221 CR Subject Classification (1998): E.3, K.6.5, C.3, D.4.6, C.2 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13
0302-9743 3-540-79965-6 Springer Berlin Heidelberg New York 978-3-540-79965-8 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © IFIP International Federation for Information Processing, Hofstrasse 3, A-2361 Laxenburg, Austria 2008 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12269297 06/3180 543210
Preface
With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded systems are becoming mo
Data Loading...