Client-Honeypots : : Exploring Malicious Websites / / Jan Gerrit Göbel, Andreas Dewald.

This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Berlin ;, Boston : : Oldenbourg Wissenschaftsverlag, , [2011]
©2011
Year of Publication:2011
Language:English
Online Access:
Physical Description:1 online resource (214 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 05114nam a22007815i 4500
001 9783486711516
003 DE-B1597
005 20220424125308.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 220424t20112011gw fo d z eng d
020 |a 9783486711516 
024 7 |a 10.1524/9783486711516  |2 doi 
035 |a (DE-B1597)233046 
035 |a (OCoLC)979892041 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a gw  |c DE 
050 4 |a QA76.9.A25  |b G63 2011 
072 7 |a COM014000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
084 |a ST 277  |q SEPA  |2 rvk  |0 (DE-625)rvk/143643: 
100 1 |a Göbel, Jan Gerrit,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Client-Honeypots :  |b Exploring Malicious Websites /  |c Jan Gerrit Göbel, Andreas Dewald. 
264 1 |a Berlin ;  |a Boston :   |b Oldenbourg Wissenschaftsverlag,   |c [2011] 
264 4 |c ©2011 
300 |a 1 online resource (214 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Front Matter --   |t 1 Introduction --   |t 2 Honeypot Basics --   |t 3 An Introduction to Client-Side Exploits --   |t 4 Protection and Analysis Tools --   |t 5 A Survey of current Client-Side Honeypots --   |t 6 Composing a Honeyclient-Framework --   |t 7 Operating Selected Client-Side Honeypots --   |t 8 Epilogue --   |t Back Matter 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy. 
520 |a With the increasing resilience of operating systems towards automated attacks, the application layer has come into the focus of criminals. Specially prepared websites in the World Wide Web compromise visitors by exploiting vulnerabilities in web browsers, emails with attached files exploit common email applications, and embedded links in instant messenger or Twitter messages lead to malware contaminated sites. This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Apr 2022) 
650 0 |a Computer networks  |x Security measures. 
650 7 |a COMPUTERS / Computer Science.  |2 bisacsh 
700 1 |a Dewald, Andreas,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Freiling, Felix. 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t DGBA Backlist Complete English Language 2000-2014 PART1  |z 9783110238570 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t DGBA Backlist Physical Sciences 2000-2014 (EN)  |z 9783110238518 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t DGBA Physical Sciences 2000 - 2014  |z 9783110637212  |o ZDB-23-GPS 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t eBook-Paket OWV  Informatik 2005-2012  |z 9783110346794  |o ZDB-42-OIN 
776 0 |c print  |z 9783486705263 
856 4 0 |u https://doi.org/10.1524/9783486711516 
856 4 0 |u https://www.degruyter.com/isbn/9783486711516 
856 4 2 |3 Cover  |u https://www.degruyter.com/document/cover/isbn/9783486711516/original 
912 |a 978-3-11-023851-8 DGBA Backlist Physical Sciences 2000-2014 (EN)  |c 2000  |d 2014 
912 |a 978-3-11-023857-0 DGBA Backlist Complete English Language 2000-2014 PART1  |c 2000  |d 2014 
912 |a EBA_BACKALL 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_DGALL 
912 |a EBA_EBACKALL 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles 
912 |a PDA12STME 
912 |a PDA13ENGE 
912 |a PDA18STMEE 
912 |a PDA5EBK 
912 |a ZDB-23-GPS  |c 2000  |d 2014 
912 |a ZDB-42-OIN  |c 2005  |d 2012