Defense and detection strategies against Internet worms

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Nazario, Jose (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boston, MA Artech House 2004
Schriftenreihe:Artech House computer security series
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV043141533
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151126s2004 |||| o||u| ||||||eng d
020 |a 1580535372  |c alk. paper  |9 1-58053-537-2 
020 |a 1580537731  |c electronic bk.  |9 1-58053-773-1 
020 |a 9781580535373  |c alk. paper  |9 978-1-58053-537-3 
020 |a 9781580537735  |c electronic bk.  |9 978-1-58053-773-5 
035 |a (OCoLC)54702918 
035 |a (DE-599)BVBBV043141533 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 005.8  |2 22 
100 1 |a Nazario, Jose  |e Verfasser  |4 aut 
245 1 0 |a Defense and detection strategies against Internet worms  |c Jose Nazario 
264 1 |a Boston, MA  |b Artech House  |c 2004 
300 |a 1 Online-Ressource (xxviii, 287 p.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Artech House computer security series 
500 |a Includes bibliographical references and index 
500 |a Defense and Detection Strategies against Internet Worms; Contents vii; Foreword xvii; Preface xxi; Acknowledgments xxvii; 1 Introduction 1; 2 Worms Defined 11; 3 Worm Traffic Patterns 23; 4 Worm History and Taxonomy 37; 5 Construction of a Worm 69; 6 Infection Patterns 83; 7 Targets of Attack 103; 8 Possible Futures for Worms 113; 9 Traffic Analysis 137; 10 Honeypots and Dark (Black Hole) Network Monitors 161; 11 Signature-Based Detection 175; 12 Host-Based Defenses 211; 13 Firewall and Network Defenses 233; 14 Proxy-Based Defenses 245; 15 Attacking the Worm Network 257; 16 Conclusions 269 
500 |a This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computer viruses  |2 fast 
650 7 |a Computer security  |2 cct 
650 7 |a Computer networks / Security measures  |2 cct 
650 7 |a Computer viruses  |2 cct 
650 4 |a Computer security 
650 4 |a Computer networks  |x Security measures 
650 4 |a Computer viruses 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
999 |a oai:aleph.bib-bvb.de:BVB01-028565724 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653  |l FAW01  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653  |l FAW02  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1804175591139704832
any_adam_object
author Nazario, Jose
author_facet Nazario, Jose
author_role aut
author_sort Nazario, Jose
author_variant j n jn
building Verbundindex
bvnumber BV043141533
collection ZDB-4-EBA
ctrlnum (OCoLC)54702918
(DE-599)BVBBV043141533
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03288nmm a2200541zc 4500</leader><controlfield tag="001">BV043141533</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580535372</subfield><subfield code="c">alk. paper</subfield><subfield code="9">1-58053-537-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580537731</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-58053-773-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580535373</subfield><subfield code="c">alk. paper</subfield><subfield code="9">978-1-58053-537-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580537735</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-58053-773-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)54702918</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043141533</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nazario, Jose</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defense and detection strategies against Internet worms</subfield><subfield code="c">Jose Nazario</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Artech House</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxviii, 287 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Defense and Detection Strategies against Internet Worms; Contents vii; Foreword xvii; Preface xxi; Acknowledgments xxvii; 1 Introduction 1; 2 Worms Defined 11; 3 Worm Traffic Patterns 23; 4 Worm History and Taxonomy 37; 5 Construction of a Worm 69; 6 Infection Patterns 83; 7 Targets of Attack 103; 8 Possible Futures for Worms 113; 9 Traffic Analysis 137; 10 Honeypots and Dark (Black Hole) Network Monitors 161; 11 Signature-Based Detection 175; 12 Host-Based Defenses 211; 13 Firewall and Network Defenses 233; 14 Proxy-Based Defenses 245; 15 Attacking the Worm Network 257; 16 Conclusions 269</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">cct</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">cct</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">cct</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=104653</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028565724</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=104653</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=104653</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043141533
illustrated Not Illustrated
indexdate 2024-07-10T07:18:43Z
institution BVB
isbn 1580535372
1580537731
9781580535373
9781580537735
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028565724
oclc_num 54702918
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource (xxviii, 287 p.)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2004
publishDateSearch 2004
publishDateSort 2004
publisher Artech House
record_format marc
series2 Artech House computer security series
spelling Nazario, Jose Verfasser aut
Defense and detection strategies against Internet worms Jose Nazario
Boston, MA Artech House 2004
1 Online-Ressource (xxviii, 287 p.)
txt rdacontent
c rdamedia
cr rdacarrier
Artech House computer security series
Includes bibliographical references and index
Defense and Detection Strategies against Internet Worms; Contents vii; Foreword xvii; Preface xxi; Acknowledgments xxvii; 1 Introduction 1; 2 Worms Defined 11; 3 Worm Traffic Patterns 23; 4 Worm History and Taxonomy 37; 5 Construction of a Worm 69; 6 Infection Patterns 83; 7 Targets of Attack 103; 8 Possible Futures for Worms 113; 9 Traffic Analysis 137; 10 Honeypots and Dark (Black Hole) Network Monitors 161; 11 Signature-Based Detection 175; 12 Host-Based Defenses 211; 13 Firewall and Network Defenses 233; 14 Proxy-Based Defenses 245; 15 Attacking the Worm Network 257; 16 Conclusions 269
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Computer viruses fast
Computer security cct
Computer networks / Security measures cct
Computer viruses cct
Computer security
Computer networks Security measures
Computer viruses
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653 Aggregator Volltext
spellingShingle Nazario, Jose
Defense and detection strategies against Internet worms
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Computer viruses fast
Computer security cct
Computer networks / Security measures cct
Computer viruses cct
Computer security
Computer networks Security measures
Computer viruses
title Defense and detection strategies against Internet worms
title_auth Defense and detection strategies against Internet worms
title_exact_search Defense and detection strategies against Internet worms
title_full Defense and detection strategies against Internet worms Jose Nazario
title_fullStr Defense and detection strategies against Internet worms Jose Nazario
title_full_unstemmed Defense and detection strategies against Internet worms Jose Nazario
title_short Defense and detection strategies against Internet worms
title_sort defense and detection strategies against internet worms
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Computer viruses fast
Computer security cct
Computer networks / Security measures cct
Computer viruses cct
Computer security
Computer networks Security measures
Computer viruses
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Computer networks / Security measures
Computer security
Computer viruses
Computer networks Security measures
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=104653
work_keys_str_mv AT nazariojose defenseanddetectionstrategiesagainstinternetworms