Defense and detection strategies against Internet worms
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Artech House
2004
|
Schriftenreihe: | Artech House computer security series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043141533 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2004 |||| o||u| ||||||eng d | ||
020 | |a 1580535372 |c alk. paper |9 1-58053-537-2 | ||
020 | |a 1580537731 |c electronic bk. |9 1-58053-773-1 | ||
020 | |a 9781580535373 |c alk. paper |9 978-1-58053-537-3 | ||
020 | |a 9781580537735 |c electronic bk. |9 978-1-58053-773-5 | ||
035 | |a (OCoLC)54702918 | ||
035 | |a (DE-599)BVBBV043141533 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Nazario, Jose |e Verfasser |4 aut | |
245 | 1 | 0 | |a Defense and detection strategies against Internet worms |c Jose Nazario |
264 | 1 | |a Boston, MA |b Artech House |c 2004 | |
300 | |a 1 Online-Ressource (xxviii, 287 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House computer security series | |
500 | |a Includes bibliographical references and index | ||
500 | |a Defense and Detection Strategies against Internet Worms; Contents vii; Foreword xvii; Preface xxi; Acknowledgments xxvii; 1 Introduction 1; 2 Worms Defined 11; 3 Worm Traffic Patterns 23; 4 Worm History and Taxonomy 37; 5 Construction of a Worm 69; 6 Infection Patterns 83; 7 Targets of Attack 103; 8 Possible Futures for Worms 113; 9 Traffic Analysis 137; 10 Honeypots and Dark (Black Hole) Network Monitors 161; 11 Signature-Based Detection 175; 12 Host-Based Defenses 211; 13 Firewall and Network Defenses 233; 14 Proxy-Based Defenses 245; 15 Attacking the Worm Network 257; 16 Conclusions 269 | ||
500 | |a This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer viruses |2 fast | |
650 | 7 | |a Computer security |2 cct | |
650 | 7 | |a Computer networks / Security measures |2 cct | |
650 | 7 | |a Computer viruses |2 cct | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer viruses | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028565724 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175591139704832 |
---|---|
any_adam_object | |
author | Nazario, Jose |
author_facet | Nazario, Jose |
author_role | aut |
author_sort | Nazario, Jose |
author_variant | j n jn |
building | Verbundindex |
bvnumber | BV043141533 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)54702918 (DE-599)BVBBV043141533 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03288nmm a2200541zc 4500</leader><controlfield tag="001">BV043141533</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580535372</subfield><subfield code="c">alk. paper</subfield><subfield code="9">1-58053-537-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580537731</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-58053-773-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580535373</subfield><subfield code="c">alk. paper</subfield><subfield code="9">978-1-58053-537-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580537735</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-58053-773-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)54702918</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043141533</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nazario, Jose</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defense and detection strategies against Internet worms</subfield><subfield code="c">Jose Nazario</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Artech House</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxviii, 287 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Defense and Detection Strategies against Internet Worms; Contents vii; Foreword xvii; Preface xxi; Acknowledgments xxvii; 1 Introduction 1; 2 Worms Defined 11; 3 Worm Traffic Patterns 23; 4 Worm History and Taxonomy 37; 5 Construction of a Worm 69; 6 Infection Patterns 83; 7 Targets of Attack 103; 8 Possible Futures for Worms 113; 9 Traffic Analysis 137; 10 Honeypots and Dark (Black Hole) Network Monitors 161; 11 Signature-Based Detection 175; 12 Host-Based Defenses 211; 13 Firewall and Network Defenses 233; 14 Proxy-Based Defenses 245; 15 Attacking the Worm Network 257; 16 Conclusions 269</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">cct</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">cct</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">cct</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028565724</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043141533 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:43Z |
institution | BVB |
isbn | 1580535372 1580537731 9781580535373 9781580537735 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028565724 |
oclc_num | 54702918 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxviii, 287 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Artech House |
record_format | marc |
series2 | Artech House computer security series |
spelling | Nazario, Jose Verfasser aut Defense and detection strategies against Internet worms Jose Nazario Boston, MA Artech House 2004 1 Online-Ressource (xxviii, 287 p.) txt rdacontent c rdamedia cr rdacarrier Artech House computer security series Includes bibliographical references and index Defense and Detection Strategies against Internet Worms; Contents vii; Foreword xvii; Preface xxi; Acknowledgments xxvii; 1 Introduction 1; 2 Worms Defined 11; 3 Worm Traffic Patterns 23; 4 Worm History and Taxonomy 37; 5 Construction of a Worm 69; 6 Infection Patterns 83; 7 Targets of Attack 103; 8 Possible Futures for Worms 113; 9 Traffic Analysis 137; 10 Honeypots and Dark (Black Hole) Network Monitors 161; 11 Signature-Based Detection 175; 12 Host-Based Defenses 211; 13 Firewall and Network Defenses 233; 14 Proxy-Based Defenses 245; 15 Attacking the Worm Network 257; 16 Conclusions 269 This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer viruses fast Computer security cct Computer networks / Security measures cct Computer viruses cct Computer security Computer networks Security measures Computer viruses http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653 Aggregator Volltext |
spellingShingle | Nazario, Jose Defense and detection strategies against Internet worms COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer viruses fast Computer security cct Computer networks / Security measures cct Computer viruses cct Computer security Computer networks Security measures Computer viruses |
title | Defense and detection strategies against Internet worms |
title_auth | Defense and detection strategies against Internet worms |
title_exact_search | Defense and detection strategies against Internet worms |
title_full | Defense and detection strategies against Internet worms Jose Nazario |
title_fullStr | Defense and detection strategies against Internet worms Jose Nazario |
title_full_unstemmed | Defense and detection strategies against Internet worms Jose Nazario |
title_short | Defense and detection strategies against Internet worms |
title_sort | defense and detection strategies against internet worms |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer viruses fast Computer security cct Computer networks / Security measures cct Computer viruses cct Computer security Computer networks Security measures Computer viruses |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer viruses Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653 |
work_keys_str_mv | AT nazariojose defenseanddetectionstrategiesagainstinternetworms |