Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/832
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKaruppayah, Shankar. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:31Z-
dc.date.available2020-05-17T08:22:31Z-
dc.date.issued2018en_US
dc.identifier.isbn9789811090509 ;en_US
dc.identifier.isbn9789811090493 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/832-
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9789811090493. ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field. ;en_US
dc.description.statementofresponsibilityby Shankar Karuppayah.en_US
dc.description.tableofcontentsChapter 1 Introduction -- Chapter 2 Background -- Chapter 3 Requirements and state of the art -- Chapter 4 The anatomy of P2P botnets -- Chapter 5 Crawling botnets -- Chapter 6 Deployment of sensor nodes in botnets.-Chapter 7 Understanding the churn dynamics in P2P botnets -- Chapter 8 Conclusion and Outlook -- Appendix -- Bibliography. ;en_US
dc.format.extentXVII, 105 p. 18 illus., 14 illus. in color. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ;en_US
dc.relation.ispartofseriesSpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ;en_US
dc.relation.haspart9789811090493.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectComputer Communication Networksen_US
dc.subjectApplications of Graph Theory and Complex Networks. ;en_US
dc.subjectSecurity. ;en_US
dc.titleAdvanced Monitoring in P2P Botnetsen_US
dc.title.alternativeA Dual Perspective /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811090493.pdf2.88 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKaruppayah, Shankar. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:31Z-
dc.date.available2020-05-17T08:22:31Z-
dc.date.issued2018en_US
dc.identifier.isbn9789811090509 ;en_US
dc.identifier.isbn9789811090493 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/832-
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9789811090493. ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field. ;en_US
dc.description.statementofresponsibilityby Shankar Karuppayah.en_US
dc.description.tableofcontentsChapter 1 Introduction -- Chapter 2 Background -- Chapter 3 Requirements and state of the art -- Chapter 4 The anatomy of P2P botnets -- Chapter 5 Crawling botnets -- Chapter 6 Deployment of sensor nodes in botnets.-Chapter 7 Understanding the churn dynamics in P2P botnets -- Chapter 8 Conclusion and Outlook -- Appendix -- Bibliography. ;en_US
dc.format.extentXVII, 105 p. 18 illus., 14 illus. in color. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ;en_US
dc.relation.ispartofseriesSpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ;en_US
dc.relation.haspart9789811090493.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectComputer Communication Networksen_US
dc.subjectApplications of Graph Theory and Complex Networks. ;en_US
dc.subjectSecurity. ;en_US
dc.titleAdvanced Monitoring in P2P Botnetsen_US
dc.title.alternativeA Dual Perspective /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811090493.pdf2.88 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKaruppayah, Shankar. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:31Z-
dc.date.available2020-05-17T08:22:31Z-
dc.date.issued2018en_US
dc.identifier.isbn9789811090509 ;en_US
dc.identifier.isbn9789811090493 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/832-
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9789811090493. ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field. ;en_US
dc.description.statementofresponsibilityby Shankar Karuppayah.en_US
dc.description.tableofcontentsChapter 1 Introduction -- Chapter 2 Background -- Chapter 3 Requirements and state of the art -- Chapter 4 The anatomy of P2P botnets -- Chapter 5 Crawling botnets -- Chapter 6 Deployment of sensor nodes in botnets.-Chapter 7 Understanding the churn dynamics in P2P botnets -- Chapter 8 Conclusion and Outlook -- Appendix -- Bibliography. ;en_US
dc.format.extentXVII, 105 p. 18 illus., 14 illus. in color. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ;en_US
dc.relation.ispartofseriesSpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ;en_US
dc.relation.haspart9789811090493.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectComputer Communication Networksen_US
dc.subjectApplications of Graph Theory and Complex Networks. ;en_US
dc.subjectSecurity. ;en_US
dc.titleAdvanced Monitoring in P2P Botnetsen_US
dc.title.alternativeA Dual Perspective /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811090493.pdf2.88 MBAdobe PDFThumbnail
Preview File