Cantitate/Preț
Produs

Advanced Monitoring in P2P Botnets: A Dual Perspective: SpringerBriefs on Cyber Security Systems and Networks

Autor Shankar Karuppayah
en Limba Engleză Paperback – 5 iun 2018
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.
Citește tot Restrânge

Din seria SpringerBriefs on Cyber Security Systems and Networks

Preț: 38108 lei

Preț vechi: 47634 lei
-20% Nou

Puncte Express: 572

Preț estimativ în valută:
7293 7568$ 6096£

Carte tipărită la comandă

Livrare economică 15-29 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9789811090493
ISBN-10: 9811090491
Pagini: 105
Ilustrații: XVII, 105 p. 18 illus., 14 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.19 kg
Ediția:1st ed. 2018
Editura: Springer Nature Singapore
Colecția Springer
Seria SpringerBriefs on Cyber Security Systems and Networks

Locul publicării:Singapore, Singapore

Cuprins

Chapter 1 Introduction.- Chapter 2 Background.- Chapter 3 Requirements and state of the art.- Chapter 4 The anatomy of P2P botnets.- Chapter 5 Crawling botnets.- Chapter 6 Deployment of sensor nodes in botnets.-Chapter 7 Understanding the churn dynamics in P2P botnets.- Chapter 8 Conclusion and Outlook.- Appendix.- Bibliography.

Notă biografică

​Dr. Shankar Karuppayah is a senior lecturer at the National Advanced IPv6 Centre, Universiti Sains Malaysia. Previously, he was attached to the Center for Advanced Security Research Darmstadt (CASED) / TU Darmstadt, Germany (2012-2016) where he also obtained his PhD. His research interests encompass cyber security topics, specifically botnet monitoring. He has published numerous botnet-related research works in respected journals and high-ranked conferences over the past five years. In addition to being regularly invited to give talks on cybersecurity topics, he is also a reviewer for several security-related journals and conferences.

Textul de pe ultima copertă

This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.

Caracteristici

Provides a unique and fresh overview of recent botnet monitoring landscapes.? Adopts a dual-perspective approach that provides a fair judgment and analysis of the investigated topics within botnet monitoring. Includes interesting, new findings on the characteristics and nature of the infected machines as well as the networks they belong to Illustrates real-world botnet data obtained from active botnets