Botnets : Architectures, Countermeasures, and Challenges.: Architectures, Countermeasures, and Challenges. (2019)
- Record Type:
- Book
- Title:
- Botnets : Architectures, Countermeasures, and Challenges.: Architectures, Countermeasures, and Challenges. (2019)
- Main Title:
- Botnets : Architectures, Countermeasures, and Challenges.
- Editors:
- Kambourakis, Georgios
Anagnostopoulos, Marios
Meng, Weizhi, 1986-
Zhou, Peng - Contents:
- Contents Preface .......................................................................................................... vii About the Editors ...........................................................................................ix Contributors...................................................................................................xi 1 Botnet Architectures: A State-of-the-Art Review.................................... 1 BASHEER AL-DUWAIR AND MOATH JARRAH 2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33 PASCAL GEENENS 3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101 PASCAL GEENENS 4 Advanced Information Hiding Techniques for Modern Botnets ....... 165 LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN WENDZEL 5 Steganography Techniques for Command and Control (C2) Channels.................................................................................... 189 JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI 6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217 WEIZHI WANG AND XIAOBO MA 7 Detecting Botnets and Unknown Network Attacks in Big Traffic Data ................................................................................. 237 LUIS SACRAMENTO, IBÉRIA MEDEIROS, JOÃO BOTA, AND MIGUEL CORREIA 8 Domain Generation Algorithm Detection Techniques through Network Analysis and Machine Learning .......................................... 269 FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA 9Contents Preface .......................................................................................................... vii About the Editors ...........................................................................................ix Contributors...................................................................................................xi 1 Botnet Architectures: A State-of-the-Art Review.................................... 1 BASHEER AL-DUWAIR AND MOATH JARRAH 2 IoT Botnets: The Journey So Far and the Road Ahead........................ 33 PASCAL GEENENS 3 IoT Botnet Traits and Techniques: A View of the State of the Art .... 101 PASCAL GEENENS 4 Advanced Information Hiding Techniques for Modern Botnets ....... 165 LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN WENDZEL 5 Steganography Techniques for Command and Control (C2) Channels.................................................................................... 189 JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI 6 Blockchain-Based Botnets for Command-and-Control Resilience .... 217 WEIZHI WANG AND XIAOBO MA 7 Detecting Botnets and Unknown Network Attacks in Big Traffic Data ................................................................................. 237 LUIS SACRAMENTO, IBÉRIA MEDEIROS, JOÃO BOTA, AND MIGUEL CORREIA 8 Domain Generation Algorithm Detection Techniques through Network Analysis and Machine Learning .......................................... 269 FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA 9 Identifying IoT-Based Botnets: A Microservice Architecture for IoT Management and Security........................................................... 293 THARUN KAMMARA AND MELODY MOH 10 Understanding and Detecting Social Botnet.......................................327 YUEDE JI AND QIANG LI 11 Use of Botnets for Mining Cryptocurrencies ......................................359 RENITA MURIMI 12 Time to Diverge the Botnet Revenues from Criminal Wallet?............387 GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND GIUSEPPE GIULIO RUTIGLIANO Index............................................................................................................403 … (more)
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2019
- Extent:
- 1 online resource (xii, 426 pages)
- Subjects:
- 621.3845
Mobile communication systems -- Security measures
Intrusion detection systems (Computer security)
COMPUTERS / Information Technology
COMPUTERS / Networking / General
COMPUTERS / Security / General
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9780429329913
0429329911
9781000649932
1000649938
9781000644951
1000644952
9781000639971
1000639975 - Related ISBNs:
- 9780367191542
- Notes:
- Note: Vendor-supplied metadata.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.460570
- Ingest File:
- 02_601.xml