CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Automatic defense against zero-day polymorphic worms in communication networks [electronic resource] / Mohssen Mohammed, Al-Sakib Khan Pathan.

By: Contributor(s): Material type: TextTextSeries: Information security booksPublication details: Boca Raton, Fla. : CRC Press, 2013.Description: xviii, 319 p. : illISBN:
  • 9781466557284 (ebook : PDF)
Subject(s): Genre/Form: Additional physical formats: No titleOnline resources: Available additional physical forms:
  • Also available in print edition.
Contents:
ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.
Summary: "Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of double-honeynet systems. It also discusses experimental implementation of signature-generation algorithms. "-- Provided by publisher.Summary: "A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

"An Auerbach book."

Includes bibliographical references and index.

ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.

"Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of double-honeynet systems. It also discusses experimental implementation of signature-generation algorithms. "-- Provided by publisher.

"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- Provided by publisher.

Also available in print edition.

Mode of access: World Wide Web.

There are no comments on this title.

to post a comment.

Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh