Cargando…

Automatic defense against zero-day polymorphic worms in communication networks /

"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Mohammed, Mohssen, 1982- (Autor), Pathan, Al-Sakib Khan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, Florida : CRC Press, [2013]
Colección:Information security books
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000nam a2200000 i 4500
001 ELB142753
003 FINmELB
005 20201022193357.0
006 m o d |
007 cr cnu||||||||
008 130226t20132013flua ob 001 0 eng|d
020 |z 9781466557277 
020 |a 9781466557284 (e-book) 
035 |a (OCoLC)847526827 
040 |a FINmELB  |b eng  |e rda  |c FINmELB 
050 4 |a QA76.76.C68  |b M64 2013 
082 0 |a 005.8  |b M697 
100 1 |a Mohammed, Mohssen,  |d 1982-  |e author. 
245 1 0 |a Automatic defense against zero-day polymorphic worms in communication networks /  |c Mohssen Mohammed, Al-Sakib Khan Pathan. 
264 1 |a Boca Raton, Florida :  |b CRC Press,  |c [2013] 
264 4 |c Ã2013 
300 |a 1 online resource (317 pages) :  |b illustrations. 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
490 0 |a Information security books 
500 |a "An Auerbach book." 
504 |a Includes bibliographical references and index. 
505 0 |a ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms. 
520 |a "A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"--  |c Provided by publisher. 
588 |a Description based on metadata supplied by the publisher and other sources. 
590 |a Electronic reproduction. Santa Fe, Arg.: elibro, 2020. Available via World Wide Web. Access may be limited to eLibro affiliated libraries. 
650 0 |a Computer viruses. 
650 0 |a Computer algorithms. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Machine theory. 
655 4 |a Electronic books. 
700 1 |a Pathan, Al-Sakib Khan,  |e author. 
797 2 |a elibro, Corp. 
856 4 0 |u https://elibro.uam.elogim.com/ereader/bidiuam/142753  |z Texto completo 
950 |a eLibro English