Buch, Englisch, 168 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 283 g
Countering the Largest Security Threat
Buch, Englisch, 168 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 283 g
Reihe: Advances in Information Security
ISBN: 978-1-4419-4330-9
Verlag: Springer US
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It is intended for researchers and advanced-level students in computer science. This book is also appropriate for practitioners in industry.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Botnet Detection Based on Network Behavior.- Honeynet-based Botnet Scan Traffic Analysis.- Characterizing Bots’ Remote Control Behavior.- Automatically Identifying Trigger-based Behavior in Malware.- Towards Sound Detection of Virtual Machines.- Botnets and Proactive System Defense.- Detecting Botnet Membership with DNSBL Counterintelligence.- A Taxonomy of Botnet Structures.