Defense and Detection Strategies against Internet Worms Contributor(s): Nazario, Jose (Author) |
|||
ISBN: 1580535372 ISBN-13: 9781580535373 Publisher: Artech House Publishers
Binding Type: Hardcover - See All Available Formats & Editions Published: November 2003 Annotation: Along with the enormous growth of the Internet, threats to computers are increasing in severity. This is the first book focused exclusively on Internet worms, offering computer and network security professionals solid worm detection and defense strategies for their work in the field. Click for more in this series: Artech House Computer Security Series |
Additional Information |
BISAC Categories: - Computers | Security - General - Business & Economics | E-commerce - General (see Also Computers - Electronic Commerce) - Computers | Networking - General |
Dewey: 005.8 |
LCCN: 2003058374 |
Series: Artech House Computer Security Series |
Physical Information: 0.85" H x 7.06" W x 9.5" L (1.42 lbs) 287 pages |
Features: Bibliography, Illustrated, Index |
Descriptions, Reviews, Etc. |
Publisher Description: Focusing exclusively on Internet worms, this book offers you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defence techniques utilizing data from live networks, real IP addresses and commercial tools. It helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security. are implemented, the book scrutinizes targets that worms have attacked over the years and the likely targets of the immediate future. Moreover, this reference explains how to detect worms using a variety of mechanisms and evaluates the strengths and weaknesses of three approaches - traffic analysis, honeypots and dark network monitors, and signature analysis. The book concludes with a discussion of four effective defences against network worms, including host-based defences, network firewalls and filters, application layer proxies, and a direct attack on the worm network itself. |
Customer ReviewsSubmit your own review |
To tell a friend about this book, you must Sign In First! |