Advanced monitoring in P2P botnets : a dual perspective /: a dual perspective. ([2018])
- Record Type:
- Book
- Title:
- Advanced monitoring in P2P botnets : a dual perspective /: a dual perspective. ([2018])
- Main Title:
- Advanced monitoring in P2P botnets : a dual perspective
- Further Information:
- Note: Shankar Karuppayah.
- Authors:
- Karuppayah, Shankar
- Contents:
- Intro; Foreword; Preface; Acknowledgements; Contents; Acronyms; 1 Introduction; 1.1 Botnet Architectures; 1.1.1 Centralized Botnets; 1.1.2 Decentralized Botnets; 1.1.3 P2P Botnets; 1.2 P2P Botnet Monitoring; 1.3 Outline; References; 2 Requirements and State of the Art; 2.1 Requirements of a Botnet Monitoring Mechanism; 2.1.1 Functional Requirements; 2.1.2 Non-functional Requirements; 2.2 Formal Model for P2P Botnets; 2.3 Related Work on Botnet Monitoring; 2.3.1 Honeypots; 2.3.2 Crawlers; 2.3.3 Sensor Nodes; 2.4 Challenges in Botnet Monitoring; 2.4.1 The Dynamic Nature of P2P Botnets 2.4.2 Noise from Unknown Third Party Monitoring Activities2.4.3 Anti-monitoring Mechanisms; 2.5 Summary; References; 3 The Anatomy of P2P Botnets; 3.1 Dissecting GameOver Zeus; 3.1.1 Bootstrapping Process; 3.1.2 Membership Maintenance Mechanism; 3.1.3 Blacklisting Mechanism; 3.2 Dissecting Sality; 3.2.1 Bootstrapping Process; 3.2.2 Membership Management Mechanism; 3.3 Dissecting ZeroAccess; 3.3.1 Bootstrapping Process; 3.3.2 Membership Management Mechanism; 3.4 Summary; References; 4 Crawling Botnets; 4.1 Circumventing Anti-crawling Mechanisms 4.1.1 Restricted NL Reply Mechanism of GameOver Zeus4.1.2 Less Invasive Crawling Algorithm (LICA); 4.2 Advanced Anti-crawling Countermeasures; 4.2.1 Enhancing GameOver Zeus' NL Restriction Mechanism; 4.2.2 BoobyTrap: Detecting Persistent Crawlers; 4.3 Evaluation; 4.3.1 Evaluation of ZeusMilker; 4.3.2 Evaluation of the Less Invasive Crawling AlgorithmIntro; Foreword; Preface; Acknowledgements; Contents; Acronyms; 1 Introduction; 1.1 Botnet Architectures; 1.1.1 Centralized Botnets; 1.1.2 Decentralized Botnets; 1.1.3 P2P Botnets; 1.2 P2P Botnet Monitoring; 1.3 Outline; References; 2 Requirements and State of the Art; 2.1 Requirements of a Botnet Monitoring Mechanism; 2.1.1 Functional Requirements; 2.1.2 Non-functional Requirements; 2.2 Formal Model for P2P Botnets; 2.3 Related Work on Botnet Monitoring; 2.3.1 Honeypots; 2.3.2 Crawlers; 2.3.3 Sensor Nodes; 2.4 Challenges in Botnet Monitoring; 2.4.1 The Dynamic Nature of P2P Botnets 2.4.2 Noise from Unknown Third Party Monitoring Activities2.4.3 Anti-monitoring Mechanisms; 2.5 Summary; References; 3 The Anatomy of P2P Botnets; 3.1 Dissecting GameOver Zeus; 3.1.1 Bootstrapping Process; 3.1.2 Membership Maintenance Mechanism; 3.1.3 Blacklisting Mechanism; 3.2 Dissecting Sality; 3.2.1 Bootstrapping Process; 3.2.2 Membership Management Mechanism; 3.3 Dissecting ZeroAccess; 3.3.1 Bootstrapping Process; 3.3.2 Membership Management Mechanism; 3.4 Summary; References; 4 Crawling Botnets; 4.1 Circumventing Anti-crawling Mechanisms 4.1.1 Restricted NL Reply Mechanism of GameOver Zeus4.1.2 Less Invasive Crawling Algorithm (LICA); 4.2 Advanced Anti-crawling Countermeasures; 4.2.1 Enhancing GameOver Zeus' NL Restriction Mechanism; 4.2.2 BoobyTrap: Detecting Persistent Crawlers; 4.3 Evaluation; 4.3.1 Evaluation of ZeusMilker; 4.3.2 Evaluation of the Less Invasive Crawling Algorithm (LICA); 4.3.3 Evaluation of the BoobyTrap Mechanism; 4.4 Summary; References; 5 Deployment of Sensor Nodes in Botnets; 5.1 Detecting Sensor Nodes in Botnets; 5.1.1 Introduction; 5.1.2 Local Clustering Coefficient (LCC); 5.1.3 SensorRanker 5.1.4 SensorBuster5.2 Circumventing Sensor Detection Mechanisms; 5.2.1 Circumventing LCC; 5.2.2 Evading SensorRanker; 5.2.3 Evading SensorBuster; 5.3 Evaluation; 5.3.1 Datasets; 5.3.2 Experimental Setup; 5.3.3 Research Questions and Expectations; 5.3.4 Results; 5.4 Summary; References; 6 Conclusion and Outlook; 6.1 Conclusion; 6.2 Outlook … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xvii, 105 pages)
- Subjects:
- 005.8
Computer science
Computer networks -- Security measures
Computer networks -- Access control
Malware (Computer software)
Peer-to-peer architecture (Computer networks)
COMPUTERS / Networking / General
Computer networks -- Access control
Computer networks -- Security measures
Malware (Computer software)
Peer-to-peer architecture (Computer networks)
Computer Science
Systems and Data Security
Computer Communication Networks
Applications of Graph Theory and Complex Networks
Security
Computers -- Hardware -- Network Hardware
Science -- System Theory
Computers -- Security -- General
Network hardware
Mathematical physics
Computer security
Data protection
Computer Communication Networks
Electronic books - Languages:
- English
- ISBNs:
- 9789811090509
9811090505 - Related ISBNs:
- 9789811090493
9811090491 - Notes:
- Note: Includes bibliographical references.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.332103
- Ingest File:
- 01_275.xml