000 03213nam a2200517 i 4500
001 EBC1220106
003 MiAaPQ
005 20240120140913.0
006 m o d |
007 cr cnu||||||||
008 130226t20132013flua ob 001 0 eng|d
020 _z9781466557277
020 _a9781466557284
_q(electronic bk.)
035 _a(MiAaPQ)EBC1220106
035 _a(Au-PeEL)EBL1220106
035 _a(CaPaEBR)ebr11009162
035 _a(CaONFJC)MIL502345
035 _a(OCoLC)853360683
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
050 4 _aQA76.76.C68
_bM64 2013
082 0 _a005.8
_bM697
100 1 _aMohammed, Mohssen,
_d1982-
_eauthor.
245 1 0 _aAutomatic defense against zero-day polymorphic worms in communication networks /
_cMohssen Mohammed, Al-Sakib Khan Pathan.
264 1 _aBoca Raton, Florida :
_bCRC Press,
_c[2013]
264 4 _c2013
300 _a1 online resource (317 pages) :
_billustrations.
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
490 0 _aInformation security books
500 _a"An Auerbach book."
504 _aIncludes bibliographical references and index.
505 0 _ach. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.
520 _a"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"--
_cProvided by publisher.
588 _aDescription based on print version record.
590 _aElectronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
650 0 _aComputer viruses.
650 0 _aComputer algorithms.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aMachine theory.
655 4 _aElectronic books.
700 1 _aPathan, Al-Sakib Khan,
_eauthor.
776 0 8 _iPrint version:
_aMohammed, Mohssen.
_tAutomatic defense against zero-day polymorphic worms in communication networks.
_dBoca Raton, Florida : CRC Press, [2013]
_hxviii, 319 pages
_kInformation security books
_z9781466557277
_w(DLC)2012044400
797 2 _aProQuest (Firm)
856 4 0 _uhttps://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=1220106
_zClick to View
999 _c97736
_d97736