000 03269nam a22005535i 4500
001 978-0-387-68768-1
003 DE-He213
005 20250710084007.0
007 cr nn 008mamaa
008 100301s2008 xxu| s |||| 0|eng d
020 _a9780387687681
_a99780387687681
024 7 _a10.1007/978-0-387-68768-1
_2doi
082 0 4 _a005.8
_223
100 1 _aLee, Wenke.
_eeditor.
245 1 0 _aBotnet Detection
_h[recurso electrónico] :
_bCountering the Largest Security Threat /
_cedited by Wenke Lee, Cliff Wang, David Dagon.
264 1 _aBoston, MA :
_bSpringer US,
_c2008.
300 _bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v36
505 0 _aBotnet Detection Based on Network Behavior -- Honeynet-based Botnet Scan Traffic Analysis -- Characterizing Bots' Remote Control Behavior -- Automatically Identifying Trigger-based Behavior in Malware -- Towards Sound Detection of Virtual Machines -- Botnets and Proactive System Defense -- Detecting Botnet Membership with DNSBL Counterintelligence -- A Taxonomy of Botnet Structures.
520 _aBotnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers. Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science.
650 0 _aCOMPUTER SCIENCE.
650 0 _aCOMPUTER NETWORK ARCHITECTURES.
650 0 _aCOMPUTER COMMUNICATION NETWORKS.
650 0 _aDATA PROTECTION.
650 0 _aDATA STRUCTURES (COMPUTER SCIENCE).
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aINFORMATION SYSTEMS.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aSYSTEMS AND DATA SECURITY.
650 2 4 _aCOMPUTER COMMUNICATION NETWORKS.
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aINFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET).
650 2 4 _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY.
650 2 4 _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS.
700 1 _aWang, Cliff.
_eeditor.
700 1 _aDagon, David.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387687667
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v36
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-68768-1
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c58019
_d58019