LEADER 03881oam 2200709I 450 001 9910828373403321 005 20240314000024.0 010 $a0-429-09814-6 010 $a1-4822-1905-0 010 $a1-4665-5728-1 024 7 $a10.1201/b14912 035 $a(CKB)2550000001101501 035 $a(EBL)1220106 035 $a(OCoLC)853360683 035 $a(SSID)ssj0000876656 035 $a(PQKBManifestationID)11465780 035 $a(PQKBTitleCode)TC0000876656 035 $a(PQKBWorkID)10904569 035 $a(PQKB)11043373 035 $a(MiAaPQ)EBC1220106 035 $a(Au-PeEL)EBL1220106 035 $a(CaPaEBR)ebr11009162 035 $a(CaONFJC)MIL502345 035 $a(OCoLC)847526827 035 $a(EXLCZ)992550000001101501 100 $a20180331d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAutomatic defense against zero-day polymorphic worms in communication networks /$fMohssen Mohammed, Al-Sakib Khan Pathan 205 $a1st ed. 210 1$aBoca Raton, Fla. :$cCRC Press,$d2013. 215 $a1 online resource (317 p.) 225 0 $aInformation security books 300 $aAn Auerbach book. 311 $a1-299-71094-8 311 $a1-4665-5727-3 320 $aIncludes bibliographical references and index. 327 $ach. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms. 330 $aPolymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of double-honeynet systems. It also discusses experimental implementation of signature-generation algorithms. --$cProvided by publisher. 330 $aA computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms--$cProvided by publisher. 606 $aComputer viruses 606 $aComputer algorithms 606 $aComputer networks$xSecurity measures 606 $aMachine theory 615 0$aComputer viruses. 615 0$aComputer algorithms. 615 0$aComputer networks$xSecurity measures. 615 0$aMachine theory. 676 $a005.8 686 $aCOM037000$aCOM051230$aCOM053000$2bisacsh 700 $aMohammed$b Mohssen$f1982,$01689304 701 $aPathan$b Al-Sakib Khan$01689305 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910828373403321 996 $aAutomatic defense against zero-day polymorphic worms in communication networks$94064272 997 $aUNINA