0
Your cart

Your cart is empty

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Buy Now

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover) Loot Price: R2,491
Discovery Miles 24 910
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover): Mohssen Mohammed, Al-Sakib Khan...

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover)

Mohssen Mohammed, Al-Sakib Khan Pathan

 (sign in to rate)
Loot Price R2,491 Discovery Miles 24 910 | Repayment Terms: R233 pm x 12*

Bookmark and Share

Expected to ship within 12 - 17 working days

Donate to Against Period Poverty

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

General

Imprint: Auerbach Publishers Inc.
Country of origin: United Kingdom
Release date: May 2013
First published: 2013
Authors: Mohssen Mohammed • Al-Sakib Khan Pathan
Dimensions: 234 x 156 x 24mm (L x W x T)
Format: Hardcover
Pages: 338
ISBN-13: 978-1-4665-5727-7
Categories: Books > Computing & IT > Social & legal aspects of computing > Computer viruses
LSN: 1-4665-5727-3
Barcode: 9781466557277

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners