• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Advanced monitoring in P2P botnets :

پدید آورنده
Shankar Karuppayah.

موضوع
Computer networks-- Access control.,Computer networks-- Security measures.,Malware (Computer software),Peer-to-peer architecture (Computer networks),Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- General.,Malware (Computer software),Mathematical physics.,Network hardware.,Peer-to-peer architecture (Computer networks)

رده
TK5105
.
59
.
K37
2018

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
9789811090509
(Number (ISBN
9811090505
Erroneous ISBN
9789811090493
Erroneous ISBN
9811090491

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Advanced monitoring in P2P botnets :
General Material Designation
[Book]
Other Title Information
a dual perspective /
First Statement of Responsibility
Shankar Karuppayah.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Singapore :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
[2018]

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xvii, 105 pages)

SERIES

Series Title
Springer Briefs on cyber security systems and networks

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references.

CONTENTS NOTE

Text of Note
Intro; Foreword; Preface; Acknowledgements; Contents; Acronyms; 1 Introduction; 1.1 Botnet Architectures; 1.1.1 Centralized Botnets; 1.1.2 Decentralized Botnets; 1.1.3 P2P Botnets; 1.2 P2P Botnet Monitoring; 1.3 Outline; References; 2 Requirements and State of the Art; 2.1 Requirements of a Botnet Monitoring Mechanism; 2.1.1 Functional Requirements; 2.1.2 Non-functional Requirements; 2.2 Formal Model for P2P Botnets; 2.3 Related Work on Botnet Monitoring; 2.3.1 Honeypots; 2.3.2 Crawlers; 2.3.3 Sensor Nodes; 2.4 Challenges in Botnet Monitoring; 2.4.1 The Dynamic Nature of P2P Botnets.
Text of Note
2.4.2 Noise from Unknown Third Party Monitoring Activities2.4.3 Anti-monitoring Mechanisms; 2.5 Summary; References; 3 The Anatomy of P2P Botnets; 3.1 Dissecting GameOver Zeus; 3.1.1 Bootstrapping Process; 3.1.2 Membership Maintenance Mechanism; 3.1.3 Blacklisting Mechanism; 3.2 Dissecting Sality; 3.2.1 Bootstrapping Process; 3.2.2 Membership Management Mechanism; 3.3 Dissecting ZeroAccess; 3.3.1 Bootstrapping Process; 3.3.2 Membership Management Mechanism; 3.4 Summary; References; 4 Crawling Botnets; 4.1 Circumventing Anti-crawling Mechanisms.
Text of Note
4.1.1 Restricted NL Reply Mechanism of GameOver Zeus4.1.2 Less Invasive Crawling Algorithm (LICA); 4.2 Advanced Anti-crawling Countermeasures; 4.2.1 Enhancing GameOver Zeus' NL Restriction Mechanism; 4.2.2 BoobyTrap: Detecting Persistent Crawlers; 4.3 Evaluation; 4.3.1 Evaluation of ZeusMilker; 4.3.2 Evaluation of the Less Invasive Crawling Algorithm (LICA); 4.3.3 Evaluation of the BoobyTrap Mechanism; 4.4 Summary; References; 5 Deployment of Sensor Nodes in Botnets; 5.1 Detecting Sensor Nodes in Botnets; 5.1.1 Introduction; 5.1.2 Local Clustering Coefficient (LCC); 5.1.3 SensorRanker.
Text of Note
5.1.4 SensorBuster5.2 Circumventing Sensor Detection Mechanisms; 5.2.1 Circumventing LCC; 5.2.2 Evading SensorRanker; 5.2.3 Evading SensorBuster; 5.3 Evaluation; 5.3.1 Datasets; 5.3.2 Experimental Setup; 5.3.3 Research Questions and Expectations; 5.3.4 Results; 5.4 Summary; References; 6 Conclusion and Outlook; 6.1 Conclusion; 6.2 Outlook.
0
8
8
8

SUMMARY OR ABSTRACT

Text of Note
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9789811090509

OTHER EDITION IN ANOTHER MEDIUM

International Standard Book Number
9789811090493

TOPICAL NAME USED AS SUBJECT

Computer networks-- Access control.
Computer networks-- Security measures.
Malware (Computer software)
Peer-to-peer architecture (Computer networks)
Computer networks-- Access control.
Computer networks-- Security measures.
Computer security.
COMPUTERS-- Networking-- General.
Malware (Computer software)
Mathematical physics.
Network hardware.
Peer-to-peer architecture (Computer networks)

(SUBJECT CATEGORY (Provisional

COM-- 043000
UR
UR
UTN
UTN

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59
Book number
.
K37
2018

PERSONAL NAME - PRIMARY RESPONSIBILITY

Karuppayah, Shankar

ORIGINATING SOURCE

Date of Transaction
20200823223258.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival