|
|
|
|
LEADER |
03477nam a2200529 4500 |
001 |
978-981-10-9050-9 |
003 |
DE-He213 |
005 |
20191029011914.0 |
007 |
cr nn 008mamaa |
008 |
180517s2018 si | s |||| 0|eng d |
020 |
|
|
|a 9789811090509
|9 978-981-10-9050-9
|
024 |
7 |
|
|a 10.1007/978-981-10-9050-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Karuppayah, Shankar.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Advanced Monitoring in P2P Botnets
|h [electronic resource] :
|b A Dual Perspective /
|c by Shankar Karuppayah.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XVII, 105 p. 18 illus., 14 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs on Cyber Security Systems and Networks,
|x 2522-5561
|
505 |
0 |
|
|a Chapter 1 Introduction -- Chapter 2 Background -- Chapter 3 Requirements and state of the art -- Chapter 4 The anatomy of P2P botnets -- Chapter 5 Crawling botnets -- Chapter 6 Deployment of sensor nodes in botnets.-Chapter 7 Understanding the churn dynamics in P2P botnets -- Chapter 8 Conclusion and Outlook -- Appendix -- Bibliography.
|
520 |
|
|
|a This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Physics.
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Applications of Graph Theory and Complex Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/P33010
|
650 |
2 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811090493
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811090516
|
830 |
|
0 |
|a SpringerBriefs on Cyber Security Systems and Networks,
|x 2522-5561
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-10-9050-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|