Client-Honeypots : : Exploring Malicious Websites / / Jan Gerrit Göbel, Andreas Dewald.

This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Berlin ;, Boston : : Oldenbourg Wissenschaftsverlag, , [2011]
©2011
Year of Publication:2011
Language:English
Online Access:
Physical Description:1 online resource (214 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Other title:Front Matter --
1 Introduction --
2 Honeypot Basics --
3 An Introduction to Client-Side Exploits --
4 Protection and Analysis Tools --
5 A Survey of current Client-Side Honeypots --
6 Composing a Honeyclient-Framework --
7 Operating Selected Client-Side Honeypots --
8 Epilogue --
Back Matter
Summary:This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy.
With the increasing resilience of operating systems towards automated attacks, the application layer has come into the focus of criminals. Specially prepared websites in the World Wide Web compromise visitors by exploiting vulnerabilities in web browsers, emails with attached files exploit common email applications, and embedded links in instant messenger or Twitter messages lead to malware contaminated sites. This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy.
Format:Mode of access: Internet via World Wide Web.
ISBN:9783486711516
9783110238570
9783110238518
9783110637212
9783110346794
DOI:10.1524/9783486711516
Access:restricted access
Hierarchical level:Monograph
Statement of Responsibility: Jan Gerrit Göbel, Andreas Dewald.