Botnets: Architectures, Countermeasures, and Challenges: Series in Security, Privacy and Trust
Editat de Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhouen Limba Engleză Hardback – 8 oct 2019
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 299.83 lei 3-5 săpt. | +22.41 lei 4-10 zile |
CRC Press – 29 aug 2022 | 299.83 lei 3-5 săpt. | +22.41 lei 4-10 zile |
Hardback (1) | 650.14 lei 6-8 săpt. | |
CRC Press – 8 oct 2019 | 650.14 lei 6-8 săpt. |
Preț: 650.14 lei
Preț vechi: 942.85 lei
-31% Nou
Puncte Express: 975
Preț estimativ în valută:
124.42€ • 129.24$ • 103.35£
124.42€ • 129.24$ • 103.35£
Carte tipărită la comandă
Livrare economică 04-18 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367191542
ISBN-10: 0367191547
Pagini: 438
Ilustrații: 7 Tables, black and white
Dimensiuni: 156 x 234 x 31 mm
Greutate: 0.8 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Series in Security, Privacy and Trust
ISBN-10: 0367191547
Pagini: 438
Ilustrații: 7 Tables, black and white
Dimensiuni: 156 x 234 x 31 mm
Greutate: 0.8 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Series in Security, Privacy and Trust
Cuprins
Contents
Preface .......................................................................................................... vii
About the Editors ...........................................................................................ix
Contributors...................................................................................................xi
1 Botnet Architectures: A State-of-the-Art Review.................................... 1
BASHEER AL-DUWAIR AND MOATH JARRAH
2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33
PASCAL GEENENS
3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101
PASCAL GEENENS
4 Advanced Information Hiding Techniques for Modern Botnets ....... 165
LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN
WENDZEL
5 Steganography Techniques for Command and Control
(C2) Channels.................................................................................... 189
JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI
6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217
WEIZHI WANG AND XIAOBO MA
7 Detecting Botnets and Unknown Network Attacks in
Big Traffic Data ................................................................................. 237
LUIS SACRAMENTO, IBÉRIA MEDEIROS, JOÃO BOTA, AND MIGUEL
CORREIA
8 Domain Generation Algorithm Detection Techniques through
Network Analysis and Machine Learning .......................................... 269
FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA
9 Identifying IoT-Based Botnets: A Microservice Architecture for
IoT Management and Security........................................................... 293
THARUN KAMMARA AND MELODY MOH
10 Understanding and Detecting Social Botnet.......................................327
YUEDE JI AND QIANG LI
11 Use of Botnets for Mining Cryptocurrencies ......................................359
RENITA MURIMI
12 Time to Diverge the Botnet Revenues from Criminal Wallet?............387
GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND
GIUSEPPE GIULIO RUTIGLIANO
Index............................................................................................................403
Preface .......................................................................................................... vii
About the Editors ...........................................................................................ix
Contributors...................................................................................................xi
1 Botnet Architectures: A State-of-the-Art Review.................................... 1
BASHEER AL-DUWAIR AND MOATH JARRAH
2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33
PASCAL GEENENS
3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101
PASCAL GEENENS
4 Advanced Information Hiding Techniques for Modern Botnets ....... 165
LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN
WENDZEL
5 Steganography Techniques for Command and Control
(C2) Channels.................................................................................... 189
JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI
6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217
WEIZHI WANG AND XIAOBO MA
7 Detecting Botnets and Unknown Network Attacks in
Big Traffic Data ................................................................................. 237
LUIS SACRAMENTO, IBÉRIA MEDEIROS, JOÃO BOTA, AND MIGUEL
CORREIA
8 Domain Generation Algorithm Detection Techniques through
Network Analysis and Machine Learning .......................................... 269
FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA
9 Identifying IoT-Based Botnets: A Microservice Architecture for
IoT Management and Security........................................................... 293
THARUN KAMMARA AND MELODY MOH
10 Understanding and Detecting Social Botnet.......................................327
YUEDE JI AND QIANG LI
11 Use of Botnets for Mining Cryptocurrencies ......................................359
RENITA MURIMI
12 Time to Diverge the Botnet Revenues from Criminal Wallet?............387
GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND
GIUSEPPE GIULIO RUTIGLIANO
Index............................................................................................................403
Notă biografică
Dr. Marios Anagnostopoulos received his Ph.D. degree in information and
communication systems engineering from the Department of Information and
Communication Systems Engineering, University of the Aegean, Greece, in 2016.
The title of his doctoral thesis was “DNS as a multipurpose attack vector.”
Currently, he is Post-Doctoral Research Fellow in the Norwegian University of
Science and Technology (NTNU). Prior to joining NTNU, he worked as Post-
Doctoral Research Fellow in the Singapore University of Technology and Design
(SUTD). His research interests are in the fields of network security and privacy,
mobile and wireless networks security, cyber-physical security, and blockchain in
security and privacy.
Dr. Georgios Kambourakis received the Ph.D. degree in information and communication
systems engineering from the Department of Information and Communications
Systems Engineering, University of the Aegean, Greece, where he is
currently an associate professor, and the head of the department. His research
interests are in the fields of mobile and wireless networks security and privacy. He
has over 120 refereed publications in the aforementioned fields of study. For more
information, please visit http://www.icsd.aegean.gr/gkamb.
Dr. Weizhi Meng is currently an assistant professor in the Cyber Security Section,
Department of Applied Mathematics and Computer Science, Technical University
of Denmark (DTU), Denmark. He received his Ph.D. degree in computer science
from the City University of Hong Kong (CityU), China. Prior to joining DTU, he
worked as a research scientist in Institute for Infocomm Research, A*Star, Singapore,
and as a senior research associate in CS Department, CityU. He won the Outstanding
Academic Performance Award during his doctoral study and is a recipient of
the Hong Kong Institution of Engineers (HKIE) Outstanding Paper Award for
Young Engineers/Researchers in both 2014 and 2017. He is also a recipient of Best
Paper Award from ISPEC 2018 and Best Student Paper Award from NSS 2016. His
primary research interests are cyber security and intelligent technology in security,
including intrusion detection, smartphone security, biometric authentication, HCI
security, trust management, blockchain in security, and malware analysis.
Dr. Peng Zhou is currently an associate professor at Shanghai University. He has
received his Ph.D. degree from the Hong Kong Polytechnic University and
worked as a research fellow in Singapore Nanyang Technological University for
one year. His research interests include network security, computer worms and
propagation, and machine learning.
communication systems engineering from the Department of Information and
Communication Systems Engineering, University of the Aegean, Greece, in 2016.
The title of his doctoral thesis was “DNS as a multipurpose attack vector.”
Currently, he is Post-Doctoral Research Fellow in the Norwegian University of
Science and Technology (NTNU). Prior to joining NTNU, he worked as Post-
Doctoral Research Fellow in the Singapore University of Technology and Design
(SUTD). His research interests are in the fields of network security and privacy,
mobile and wireless networks security, cyber-physical security, and blockchain in
security and privacy.
Dr. Georgios Kambourakis received the Ph.D. degree in information and communication
systems engineering from the Department of Information and Communications
Systems Engineering, University of the Aegean, Greece, where he is
currently an associate professor, and the head of the department. His research
interests are in the fields of mobile and wireless networks security and privacy. He
has over 120 refereed publications in the aforementioned fields of study. For more
information, please visit http://www.icsd.aegean.gr/gkamb.
Dr. Weizhi Meng is currently an assistant professor in the Cyber Security Section,
Department of Applied Mathematics and Computer Science, Technical University
of Denmark (DTU), Denmark. He received his Ph.D. degree in computer science
from the City University of Hong Kong (CityU), China. Prior to joining DTU, he
worked as a research scientist in Institute for Infocomm Research, A*Star, Singapore,
and as a senior research associate in CS Department, CityU. He won the Outstanding
Academic Performance Award during his doctoral study and is a recipient of
the Hong Kong Institution of Engineers (HKIE) Outstanding Paper Award for
Young Engineers/Researchers in both 2014 and 2017. He is also a recipient of Best
Paper Award from ISPEC 2018 and Best Student Paper Award from NSS 2016. His
primary research interests are cyber security and intelligent technology in security,
including intrusion detection, smartphone security, biometric authentication, HCI
security, trust management, blockchain in security, and malware analysis.
Dr. Peng Zhou is currently an associate professor at Shanghai University. He has
received his Ph.D. degree from the Hong Kong Polytechnic University and
worked as a research fellow in Singapore Nanyang Technological University for
one year. His research interests include network security, computer worms and
propagation, and machine learning.
Descriere
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics