It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_2016/BooksAll.2016.part39.utf8:226377339:2838
Source Library of Congress
Download Link /show-records/marc_loc_2016/BooksAll.2016.part39.utf8:226377339:2838?format=raw

LEADER: 02838cam a2200409 i 4500
001 2012044400
003 DLC
005 20151024080812.0
008 130226t20132013flua b 001 0 eng
010 $a 2012044400
020 $a9781466557277 (hardback)
020 $a1466557273 (hardback)
040 $aDLC$beng$cDLC$erda$dDLC
042 $apcc
050 00 $aQA76.76.C68$bM64 2013
082 00 $a005.8$223
084 $aCOM037000$aCOM051230$aCOM053000$2bisacsh
100 1 $aMohammed, Mohssen,$d1982-
245 10 $aAutomatic defense against zero-day polymorphic worms in communication networks /$cMohssen Mohammed, Al-Sakib Khan Pathan.
264 1 $aBoca Raton :$bCRC Press, Taylor & Francis Group,$c[2013]
264 4 $c©2013
300 $axviii, 319 pages :$billustrations ;$c25 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
520 $a"Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of double-honeynet systems. It also discusses experimental implementation of signature-generation algorithms."--$cProvided by publisher.
520 $a"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"--$cProvided by publisher.
504 $aIncludes bibliographical references and index.
650 0 $aComputer viruses.
650 0 $aComputer algorithms.
650 0 $aComputer networks$xSecurity measures.
650 0 $aMachine theory.
650 7 $aCOMPUTERS / Machine Theory.$2bisacsh
650 7 $aCOMPUTERS / Software Development & Engineering / General.$2bisacsh
650 7 $aCOMPUTERS / Security / General.$2bisacsh
700 1 $aPathan, Al-Sakib Khan.
856 42 $3Cover image$uhttp://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146655/9781466557277.jpg