Hopp til hovedinnhold

Klikk her for å se avvik og utvikling i leveranser og nettbutikk (oppdatert 12. september)

Omslagsbilde

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

Pathan, Al-Sakib Khan Mohammed, Mohssen

Innbundet

Produseres på bestilling

Leveringstid: 2-4 uker

Handlinger

Beskrivelse

Omtale

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow.Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems.If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There’s also a chapter with references to helpful reading resources on automated signature generation systems.The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

  • Utgivelsesdato:

    21.05.2013

  • ISBN/Varenr:

    9781466557277

  • Språk:

    , Engelsk

  • Forlag:

    Auerbach

  • Fagtema:

    Data- og informasjonsteknologi

  • Litteraturtype:

    Faglitteratur

  • Sider:

    338

  • Høyde:

    23.5 cm

  • Bredde:

    16.4 cm

Transforming Cybersecurity with Machine Learning

Transforming Cybersecurity with Machine Learning

9781041171683 Heftet
26.12.2025
Engelsk

Forventes utgitt
Transforming Cybersecurity with Machine Learning

Transforming Cybersecurity with Machine Learning

9781041171676 Innbundet
26.12.2025
Engelsk

Forventes utgitt
Combatting Cyberbullying in Digital Media with Artificial Intelligence

Combatting Cyberbullying in Digital Media with Artificial Intelligence

9781032493015 Heftet
30.07.2025
Engelsk

Produseres på bestilling
Deep Learning for Internet of Things Infrastructure

Deep Learning for Internet of Things Infrastructure

9781032064703 Heftet
07.10.2024
Engelsk

Produseres på bestilling
Securing Social Networks in Cyberspace

Securing Social Networks in Cyberspace

9780367681753 Heftet
07.10.2024
Engelsk

Produseres på bestilling
Combatting Cyberbullying in Digital Media with Artificial Intelligence

Combatting Cyberbullying in Digital Media with Artificial Intelligence

9781032491882 Innbundet
13.12.2023
Engelsk

Produseres på bestilling
Security Analytics for the Internet of Everything

Security Analytics for the Internet of Everything

9781032400693 Heftet
29.08.2022
Engelsk

Produseres på bestilling