LEADER 03576nam 22005895 450 001 9910299295203321 005 20200706120507.0 010 $a981-10-9050-5 024 7 $a10.1007/978-981-10-9050-9 035 $a(CKB)4100000004244342 035 $a(DE-He213)978-981-10-9050-9 035 $a(MiAaPQ)EBC5398384 035 $a(PPN)227400763 035 $a(EXLCZ)994100000004244342 100 $a20180517d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Monitoring in P2P Botnets $eA Dual Perspective /$fby Shankar Karuppayah 205 $a1st ed. 2018. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2018. 215 $a1 online resource (XVII, 105 p. 18 illus., 14 illus. in color.) 225 1 $aSpringerBriefs on Cyber Security Systems and Networks,$x2522-5561 311 $a981-10-9049-1 320 $aIncludes bibliographical references. 327 $aChapter 1 Introduction -- Chapter 2 Background -- Chapter 3 Requirements and state of the art -- Chapter 4 The anatomy of P2P botnets -- Chapter 5 Crawling botnets -- Chapter 6 Deployment of sensor nodes in botnets.-Chapter 7 Understanding the churn dynamics in P2P botnets -- Chapter 8 Conclusion and Outlook -- Appendix -- Bibliography. 330 $aThis book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field. 410 0$aSpringerBriefs on Cyber Security Systems and Networks,$x2522-5561 606 $aComputer security 606 $aComputer networks 606 $aPhysics 606 $aData protection 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aApplications of Graph Theory and Complex Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/P33010 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 615 0$aComputer security. 615 0$aComputer networks. 615 0$aPhysics. 615 0$aData protection. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aApplications of Graph Theory and Complex Networks. 615 24$aSecurity. 676 $a005.8 700 $aKaruppayah$b Shankar$4aut$4http://id.loc.gov/vocabulary/relators/aut$0998003 906 $aBOOK 912 $a9910299295203321 996 $aAdvanced Monitoring in P2P Botnets$92288999 997 $aUNINA