Botnet Detection [electronic resource] : Countering the Largest Security Threat / edited by Wenke Lee, Cliff Wang, David Dagon.
Tipo de material: TextoSeries Advances in Information Security ; 36 | Advances in Information Security ; 36Editor: Boston, MA : Springer US, 2008Descripción: XII, 168 p. online resourceTipo de contenido:- text
- computer
- online resource
- 9780387687681
- SpringerLink (Online service)
- Computer science
- Computer network architectures
- Computer Communication Networks
- Data protection
- Data structures (Computer science)
- Data encryption (Computer science)
- Information systems
- Computer Science
- Systems and Data Security
- Computer Communication Networks
- Data Encryption
- Information Systems Applications (incl.Internet)
- Data Structures, Cryptology and Information Theory
- Computer Systems Organization and Communication Networks
- 005.8 23
- Libro electrónico
Botnet Detection Based on Network Behavior -- Honeynet-based Botnet Scan Traffic Analysis -- Characterizing Bots Remote Control Behavior -- Automatically Identifying Trigger-based Behavior in Malware -- Towards Sound Detection of Virtual Machines -- Botnets and Proactive System Defense -- Detecting Botnet Membership with DNSBL Counterintelligence -- A Taxonomy of Botnet Structures.
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers. Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science.
ZDB-2-SCS
No hay comentarios en este titulo.