LEADER 00726nam0-2200253 --450 001 9910363359703321 005 20200115145736.0 010 $a9781-107-41455-6$BPaperback 100 $a20200115d2014----kmuy0itay5050 ba 101 0 $aeng$arus 102 $aGB 105 $a 001yy 200 1 $a<>syntax of Russian$fJohn Frederick Bailyn 210 $aCambridge$cCambridge University Press$d2014 215 $aXVIII, 373 p.$d23 cm 225 1 $aCambridge syntax guides 700 1$aBailyn,$bJohn F.$0770000 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910363359703321 952 $a491.7 BAI 1$b2019/2033$fFLFBC 959 $aFLFBC 996 $aSyntax of Russian$91570450 997 $aUNINA LEADER 03916oam 2200721I 450 001 9910963220003321 005 20251116182338.0 010 $a0-429-09814-6 010 $a1-4822-1905-0 010 $a1-4665-5728-1 024 7 $a10.1201/b14912 035 $a(CKB)2550000001101501 035 $a(EBL)1220106 035 $a(OCoLC)853360683 035 $a(SSID)ssj0000876656 035 $a(PQKBManifestationID)11465780 035 $a(PQKBTitleCode)TC0000876656 035 $a(PQKBWorkID)10904569 035 $a(PQKB)11043373 035 $a(MiAaPQ)EBC1220106 035 $a(Au-PeEL)EBL1220106 035 $a(CaPaEBR)ebr11009162 035 $a(CaONFJC)MIL502345 035 $a(OCoLC)847526827 035 $a(FINmELB)ELB142753 035 $a(EXLCZ)992550000001101501 100 $a20180331d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAutomatic defense against zero-day polymorphic worms in communication networks /$fMohssen Mohammed, Al-Sakib Khan Pathan 205 $a1st ed. 210 1$aBoca Raton, Fla. :$cCRC Press,$d2013. 215 $a1 online resource (317 p.) 225 0 $aInformation security books 300 $aAn Auerbach book. 311 08$a1-299-71094-8 311 08$a1-4665-5727-3 320 $aIncludes bibliographical references and index. 327 $ach. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms. 330 $aPolymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of double-honeynet systems. It also discusses experimental implementation of signature-generation algorithms. --$cProvided by publisher. 330 $aA computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms--$cProvided by publisher. 606 $aComputer viruses 606 $aComputer algorithms 606 $aComputer networks$xSecurity measures 606 $aMachine theory 615 0$aComputer viruses. 615 0$aComputer algorithms. 615 0$aComputer networks$xSecurity measures. 615 0$aMachine theory. 676 $a005.8 686 $aCOM037000$aCOM051230$aCOM053000$2bisacsh 700 $aMohammed$b Mohssen$f1982,$01874929 701 $aPathan$b Al-Sakib Khan$01829040 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910963220003321 996 $aAutomatic defense against zero-day polymorphic worms in communication networks$94485764 997 $aUNINA