Automatic defense against zero-day polymorphic worms in communication networks. (2013)
- Record Type:
- Book
- Title:
- Automatic defense against zero-day polymorphic worms in communication networks. (2013)
- Main Title:
- Automatic defense against zero-day polymorphic worms in communication networks
- Further Information:
- Note: Mohssen Mohammed, Al-Sakib Khan Pathan.
- Authors:
- Mohammed, Mohssen, 1982-
Pathan, Al-Sakib Khan - Contents:
- The Fundamental Concepts; Introduction; Network Security Concepts Automated Signature Generation for Zero-Day Polymorphic Worms; Our Experience and This Book’s Objective; References; ; Computer Networking; Computer Technologies; Network Topology Point-to-Point Topology Daisy-Chain Topology Bus (Point-to-Multipoint) Topology Distributed Bus Topology Ring Topology; Dual-Ring Topology Star Topology Star-Wired Bus Topology Star-Wired Ring Topology; Mesh Topology Hierarchical or Tree Topology Dual-Homing Topology; Internet Protocol; Transmission Control Protocol; IP Routers; Ethernet Switch; IP Routing and Routing Table; Discussion on Router Access Mechanisms for Administrators; Security Policy for a Router Router Security Policy Checklist; Network Traffic Filtering Packet Filtering Source Routing; Tools Used for Traffic Filtering or Network Monitoring Packet Capture; Concluding Remarks; References; ; Intrusion Detection and Prevention Systems (ID PSs); Introduction; IDPS Detection Methods Signature-Based Detection Anomaly-Based Detection Stateful Protocol Analysis; IDPS Components; IDPS Security Capabilities; Types of IDPS Technologies Network-Based IDPSs Wireless IDPSs NBA Systems Host-Based IDPS; Integration of Multiple IDPSs Multiple IDPS Technologies Integration of Different IDPS Products; IDPS Products; Common Enterprise Network-Based IDPSs Common Enterprise Wireless IDPSs Common Enterprise NBA Systems; Common Enterprise Host-Based IDPSs; Concluding Remarks; References; ;The Fundamental Concepts; Introduction; Network Security Concepts Automated Signature Generation for Zero-Day Polymorphic Worms; Our Experience and This Book’s Objective; References; ; Computer Networking; Computer Technologies; Network Topology Point-to-Point Topology Daisy-Chain Topology Bus (Point-to-Multipoint) Topology Distributed Bus Topology Ring Topology; Dual-Ring Topology Star Topology Star-Wired Bus Topology Star-Wired Ring Topology; Mesh Topology Hierarchical or Tree Topology Dual-Homing Topology; Internet Protocol; Transmission Control Protocol; IP Routers; Ethernet Switch; IP Routing and Routing Table; Discussion on Router Access Mechanisms for Administrators; Security Policy for a Router Router Security Policy Checklist; Network Traffic Filtering Packet Filtering Source Routing; Tools Used for Traffic Filtering or Network Monitoring Packet Capture; Concluding Remarks; References; ; Intrusion Detection and Prevention Systems (ID PSs); Introduction; IDPS Detection Methods Signature-Based Detection Anomaly-Based Detection Stateful Protocol Analysis; IDPS Components; IDPS Security Capabilities; Types of IDPS Technologies Network-Based IDPSs Wireless IDPSs NBA Systems Host-Based IDPS; Integration of Multiple IDPSs Multiple IDPS Technologies Integration of Different IDPS Products; IDPS Products; Common Enterprise Network-Based IDPSs Common Enterprise Wireless IDPSs Common Enterprise NBA Systems; Common Enterprise Host-Based IDPSs; Concluding Remarks; References; ; Honeypots; Definition and History of Honeypots Honeypot and Its Working Principle History of Honeypots Types of Honeypots; Types of Threats Script Kiddies and Advanced Blackhat Attacks Attackers’ Motivations; The Value of Honeypots Advantages of Honeypots Disadvantages of Honeypots Roles of Honeypots in Network Security; Honeypot Types Based on Interaction Level Low-Interaction Honeypots; High-Interaction Honeypots; Medium-Interaction Honeypots; An Overview of Five Honeypots BackOfficer Friendly Specter Honeyd ManTrap Honeynets; Conclusion; References; Internet Worms; Introduction ; Infection Code Injection Edge Injection Data Injection; Spreading; Hiding Traffic Shaping Polymorphism Fingerprinting; Worm Components Reconnaissance Attack Components Communication Components Command Components Intelligence Capabilities; Worm Life Random Scanning Random Scanning Using Lists Island Hopping Directed Attacking Hit-List Scanning; Polymorphic Worms: Definition and Anatomy Polymorphic Worm Definition; Polymorphic Worm Structure Invariant Bytes; Polymorphic Worm Techniques Signature Classes for Polymorphic Worms; Internet Worm Prevention Methods Prevention of Vulnerabilities Prevention of Exploits; Conclusion; References; ; Reading Resources on Automated Signature Generation Systems; Introduction; Hybrid System (Network Based and Host Based) Network-Based Mechanisms Host-Based Mechanisms; References; ; Signature Generation Algorithms for Polymorphic Worms; String Matching Exact String-Matching Algorithms; Approximate String-Matching Algorithms ; Machine Learning Supervised Learning; Algorithm Selection Logic-Based Algorithms Learning Set of Rules Statistical Learning Algorithms; Support Vector Machines; Unsupervised Learning; A Brief Introduction to Unsupervised Learning Dimensionality Reduction and Clustering Models; Expectation–Maximization Algorithm Modeling Time Series and Other Structured Data; Nonlinear, Factorial, and Hierarchical Models Intractability Graphical Models Exact Inference in Graphs Learning in Graphical Models; Bayesian Model Comparison and Occam’s Razor; Concluding Remark; References; ; Zero-Day Polymorphic Worm Collection Method ; Introduction & … (more)
- Publisher Details:
- Boca Raton, Florida : Auerbach
- Publication Date:
- 2013
- Extent:
- 1 online resource (1 volume), illustrations (black and white)
- Subjects:
- 005.8
Computer viruses
Computer algorithms
Computer networks -- Security measures
Machine theory
Computer algorithms
Computer networks -- Security measures
Computer viruses
Machine theory
Electronic books - Languages:
- English
- ISBNs:
- 1466557273
9781466557277
1466557281
9781466557284 - Notes:
- Note: Includes bibliographical references and index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.143481
- Ingest File:
- 01_037.xml