IUKL Library
Normal view MARC view ISBD view

Automatic defense against zero-day polymorphic worms in communication networks / Mohssen Mohammed, Al-Sakib Khan Pathan.

By: Mohammed, Mohssen, 1982- [author.].
Contributor(s): Pathan, Al-Sakib Khan [author.].
Material type: materialTypeLabelBookSeries: Information security books.Publisher: Boca Raton, Florida : CRC Press, [2013]Copyright date: �2013Description: 1 online resource (317 pages) : illustrations.Content type: text Media type: computer Carrier type: online resourceISBN: 9781466557284 (e-book).Subject(s): Computer viruses | Computer algorithms | Computer networks -- Security measures | Machine theoryGenre/Form: Electronic books.DDC classification: 005.8 Online resources: Click to View
Contents:
ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.
Summary: "A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Collection Call number URL Copy number Status Date due Item holds
E-book E-book IUKL Library
Subscripti https://ebookcentral.proquest.com/lib/kliuc-ebooks/detail.action?docID=1220106 1 Available
Total holds: 0

"An Auerbach book."

Includes bibliographical references and index.

ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.

"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- Provided by publisher.

Description based on print version record.

Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

There are no comments for this item.

Log in to your account to post a comment.
The Library's homepage is at http://library.iukl.edu.my/.