Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan.

"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Boca Raton, Florida : : CRC Press,, [2013]
2013
Year of Publication:2013
Language:English
Series:Information security books
Online Access:
Physical Description:1 online resource (317 pages) :; illustrations.
Notes:"An Auerbach book."
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5001220106
ctrlnum (MiAaPQ)5001220106
(Au-PeEL)EBL1220106
(CaPaEBR)ebr11009162
(CaONFJC)MIL502345
(OCoLC)853360683
collection bib_alma
record_format marc
spelling Mohammed, Mohssen, 1982- author.
Automatic defense against zero-day polymorphic worms in communication networks / Mohssen Mohammed, Al-Sakib Khan Pathan.
Boca Raton, Florida : CRC Press, [2013]
2013
1 online resource (317 pages) : illustrations.
text rdacontent
computer rdamedia
online resource rdacarrier
Information security books
"An Auerbach book."
Includes bibliographical references and index.
ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.
"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- Provided by publisher.
Description based on print version record.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Computer viruses.
Computer algorithms.
Computer networks Security measures.
Machine theory.
Electronic books.
Pathan, Al-Sakib Khan, author.
Print version: Mohammed, Mohssen. Automatic defense against zero-day polymorphic worms in communication networks. Boca Raton, Florida : CRC Press, [2013] xviii, 319 pages Information security books 9781466557277 (DLC)2012044400
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1220106 Click to View
language English
format eBook
author Mohammed, Mohssen, 1982-
Pathan, Al-Sakib Khan,
spellingShingle Mohammed, Mohssen, 1982-
Pathan, Al-Sakib Khan,
Automatic defense against zero-day polymorphic worms in communication networks /
Information security books
ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.
author_facet Mohammed, Mohssen, 1982-
Pathan, Al-Sakib Khan,
Pathan, Al-Sakib Khan,
author_variant m m mm
a s k p ask askp
author_role VerfasserIn
VerfasserIn
author2 Pathan, Al-Sakib Khan,
author2_role TeilnehmendeR
author_sort Mohammed, Mohssen, 1982-
title Automatic defense against zero-day polymorphic worms in communication networks /
title_full Automatic defense against zero-day polymorphic worms in communication networks / Mohssen Mohammed, Al-Sakib Khan Pathan.
title_fullStr Automatic defense against zero-day polymorphic worms in communication networks / Mohssen Mohammed, Al-Sakib Khan Pathan.
title_full_unstemmed Automatic defense against zero-day polymorphic worms in communication networks / Mohssen Mohammed, Al-Sakib Khan Pathan.
title_auth Automatic defense against zero-day polymorphic worms in communication networks /
title_new Automatic defense against zero-day polymorphic worms in communication networks /
title_sort automatic defense against zero-day polymorphic worms in communication networks /
series Information security books
series2 Information security books
publisher CRC Press,
publishDate 2013
physical 1 online resource (317 pages) : illustrations.
contents ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.
isbn 9781466557284
9781466557277
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.76 C68 M64 42013
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1220106
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 853360683
work_keys_str_mv AT mohammedmohssen automaticdefenseagainstzerodaypolymorphicwormsincommunicationnetworks
AT pathanalsakibkhan automaticdefenseagainstzerodaypolymorphicwormsincommunicationnetworks
status_str n
ids_txt_mv (MiAaPQ)5001220106
(Au-PeEL)EBL1220106
(CaPaEBR)ebr11009162
(CaONFJC)MIL502345
(OCoLC)853360683
is_hierarchy_title Automatic defense against zero-day polymorphic worms in communication networks /
author2_original_writing_str_mv noLinkedField
_version_ 1792330752583532544
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03179nam a2200505 i 4500</leader><controlfield tag="001">5001220106</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">130226t20132013flua ob 001 0 eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781466557277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466557284</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001220106</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1220106</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr11009162</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL502345</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)853360683</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.C68</subfield><subfield code="b">M64 2013</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="b">M697</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mohammed, Mohssen,</subfield><subfield code="d">1982-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Automatic defense against zero-day polymorphic worms in communication networks /</subfield><subfield code="c">Mohssen Mohammed, Al-Sakib Khan Pathan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Florida :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (317 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security books</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"An Auerbach book."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer viruses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer algorithms.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Machine theory.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pathan, Al-Sakib Khan,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Mohammed, Mohssen.</subfield><subfield code="t">Automatic defense against zero-day polymorphic worms in communication networks.</subfield><subfield code="d">Boca Raton, Florida : CRC Press, [2013]</subfield><subfield code="h">xviii, 319 pages</subfield><subfield code="k">Information security books</subfield><subfield code="z">9781466557277</subfield><subfield code="w">(DLC)2012044400</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1220106</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>