Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan.
"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel...
Saved in:
VerfasserIn: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Boca Raton, Florida : : CRC Press,, [2013] 2013 |
Year of Publication: | 2013 |
Language: | English |
Series: | Information security books
|
Online Access: | |
Physical Description: | 1 online resource (317 pages) :; illustrations. |
Notes: | "An Auerbach book." |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5001220106 |
---|---|
ctrlnum |
(MiAaPQ)5001220106 (Au-PeEL)EBL1220106 (CaPaEBR)ebr11009162 (CaONFJC)MIL502345 (OCoLC)853360683 |
collection |
bib_alma |
record_format |
marc |
spelling |
Mohammed, Mohssen, 1982- author. Automatic defense against zero-day polymorphic worms in communication networks / Mohssen Mohammed, Al-Sakib Khan Pathan. Boca Raton, Florida : CRC Press, [2013] 2013 1 online resource (317 pages) : illustrations. text rdacontent computer rdamedia online resource rdacarrier Information security books "An Auerbach book." Includes bibliographical references and index. ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms. "A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- Provided by publisher. Description based on print version record. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Computer viruses. Computer algorithms. Computer networks Security measures. Machine theory. Electronic books. Pathan, Al-Sakib Khan, author. Print version: Mohammed, Mohssen. Automatic defense against zero-day polymorphic worms in communication networks. Boca Raton, Florida : CRC Press, [2013] xviii, 319 pages Information security books 9781466557277 (DLC)2012044400 ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1220106 Click to View |
language |
English |
format |
eBook |
author |
Mohammed, Mohssen, 1982- Pathan, Al-Sakib Khan, |
spellingShingle |
Mohammed, Mohssen, 1982- Pathan, Al-Sakib Khan, Automatic defense against zero-day polymorphic worms in communication networks / Information security books ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms. |
author_facet |
Mohammed, Mohssen, 1982- Pathan, Al-Sakib Khan, Pathan, Al-Sakib Khan, |
author_variant |
m m mm a s k p ask askp |
author_role |
VerfasserIn VerfasserIn |
author2 |
Pathan, Al-Sakib Khan, |
author2_role |
TeilnehmendeR |
author_sort |
Mohammed, Mohssen, 1982- |
title |
Automatic defense against zero-day polymorphic worms in communication networks / |
title_full |
Automatic defense against zero-day polymorphic worms in communication networks / Mohssen Mohammed, Al-Sakib Khan Pathan. |
title_fullStr |
Automatic defense against zero-day polymorphic worms in communication networks / Mohssen Mohammed, Al-Sakib Khan Pathan. |
title_full_unstemmed |
Automatic defense against zero-day polymorphic worms in communication networks / Mohssen Mohammed, Al-Sakib Khan Pathan. |
title_auth |
Automatic defense against zero-day polymorphic worms in communication networks / |
title_new |
Automatic defense against zero-day polymorphic worms in communication networks / |
title_sort |
automatic defense against zero-day polymorphic worms in communication networks / |
series |
Information security books |
series2 |
Information security books |
publisher |
CRC Press, |
publishDate |
2013 |
physical |
1 online resource (317 pages) : illustrations. |
contents |
ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms. |
isbn |
9781466557284 9781466557277 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.76 C68 M64 42013 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1220106 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
853360683 |
work_keys_str_mv |
AT mohammedmohssen automaticdefenseagainstzerodaypolymorphicwormsincommunicationnetworks AT pathanalsakibkhan automaticdefenseagainstzerodaypolymorphicwormsincommunicationnetworks |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5001220106 (Au-PeEL)EBL1220106 (CaPaEBR)ebr11009162 (CaONFJC)MIL502345 (OCoLC)853360683 |
is_hierarchy_title |
Automatic defense against zero-day polymorphic worms in communication networks / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1792330752583532544 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03179nam a2200505 i 4500</leader><controlfield tag="001">5001220106</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">130226t20132013flua ob 001 0 eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781466557277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466557284</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001220106</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1220106</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr11009162</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL502345</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)853360683</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.C68</subfield><subfield code="b">M64 2013</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="b">M697</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mohammed, Mohssen,</subfield><subfield code="d">1982-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Automatic defense against zero-day polymorphic worms in communication networks /</subfield><subfield code="c">Mohssen Mohammed, Al-Sakib Khan Pathan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Florida :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (317 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security books</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"An Auerbach book."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer viruses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer algorithms.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Machine theory.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pathan, Al-Sakib Khan,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Mohammed, Mohssen.</subfield><subfield code="t">Automatic defense against zero-day polymorphic worms in communication networks.</subfield><subfield code="d">Boca Raton, Florida : CRC Press, [2013]</subfield><subfield code="h">xviii, 319 pages</subfield><subfield code="k">Information security books</subfield><subfield code="z">9781466557277</subfield><subfield code="w">(DLC)2012044400</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1220106</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |