The Resource Advanced monitoring in P2P botnets : a dual perspective, Shankar Karuppayah, (electronic book) | (electronic book)
Advanced monitoring in P2P botnets : a dual perspective, Shankar Karuppayah, (electronic book) | (electronic book)
Resource Information
The item Advanced monitoring in P2P botnets : a dual perspective, Shankar Karuppayah, (electronic book) | (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.This item is available to borrow from 1 library branch.
Resource Information
The item Advanced monitoring in P2P botnets : a dual perspective, Shankar Karuppayah, (electronic book) | (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.
This item is available to borrow from 1 library branch.
- Summary
- This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field
- Language
- eng
- Extent
- 1 online resource.
- Contents
-
- Intro; Foreword; Preface; Acknowledgements; Contents; Acronyms; 1 Introduction; 1.1 Botnet Architectures; 1.1.1 Centralized Botnets; 1.1.2 Decentralized Botnets; 1.1.3 P2P Botnets; 1.2 P2P Botnet Monitoring; 1.3 Outline; References; 2 Requirements and State of the Art; 2.1 Requirements of a Botnet Monitoring Mechanism; 2.1.1 Functional Requirements; 2.1.2 Non-functional Requirements; 2.2 Formal Model for P2P Botnets; 2.3 Related Work on Botnet Monitoring; 2.3.1 Honeypots; 2.3.2 Crawlers; 2.3.3 Sensor Nodes; 2.4 Challenges in Botnet Monitoring; 2.4.1 The Dynamic Nature of P2P Botnets
- 2.4.2 Noise from Unknown Third Party Monitoring Activities2.4.3 Anti-monitoring Mechanisms; 2.5 Summary; References; 3 The Anatomy of P2P Botnets; 3.1 Dissecting GameOver Zeus; 3.1.1 Bootstrapping Process; 3.1.2 Membership Maintenance Mechanism; 3.1.3 Blacklisting Mechanism; 3.2 Dissecting Sality; 3.2.1 Bootstrapping Process; 3.2.2 Membership Management Mechanism; 3.3 Dissecting ZeroAccess; 3.3.1 Bootstrapping Process; 3.3.2 Membership Management Mechanism; 3.4 Summary; References; 4 Crawling Botnets; 4.1 Circumventing Anti-crawling Mechanisms
- 4.1.1 Restricted NL Reply Mechanism of GameOver Zeus4.1.2 Less Invasive Crawling Algorithm (LICA); 4.2 Advanced Anti-crawling Countermeasures; 4.2.1 Enhancing GameOver Zeus' NL Restriction Mechanism; 4.2.2 BoobyTrap: Detecting Persistent Crawlers; 4.3 Evaluation; 4.3.1 Evaluation of ZeusMilker; 4.3.2 Evaluation of the Less Invasive Crawling Algorithm (LICA); 4.3.3 Evaluation of the BoobyTrap Mechanism; 4.4 Summary; References; 5 Deployment of Sensor Nodes in Botnets; 5.1 Detecting Sensor Nodes in Botnets; 5.1.1 Introduction; 5.1.2 Local Clustering Coefficient (LCC); 5.1.3 SensorRanker
- 5.1.4 SensorBuster5.2 Circumventing Sensor Detection Mechanisms; 5.2.1 Circumventing LCC; 5.2.2 Evading SensorRanker; 5.2.3 Evading SensorBuster; 5.3 Evaluation; 5.3.1 Datasets; 5.3.2 Experimental Setup; 5.3.3 Research Questions and Expectations; 5.3.4 Results; 5.4 Summary; References; 6 Conclusion and Outlook; 6.1 Conclusion; 6.2 Outlook
- Isbn
- 9789811090509
- Label
- Advanced monitoring in P2P botnets : a dual perspective
- Title
- Advanced monitoring in P2P botnets
- Title remainder
- a dual perspective
- Statement of responsibility
- Shankar Karuppayah
- Language
- eng
- Summary
- This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field
- Cataloging source
- YDX
- http://library.link/vocab/creatorName
- Karuppayah, Shankar
- Dewey number
- 005.8
- Index
- no index present
- LC call number
- TK5105.59
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- Series statement
- Springer Briefs on cyber security systems and networks
- http://library.link/vocab/subjectName
-
- Computer networks
- Computer networks
- Malware (Computer software)
- Peer-to-peer architecture (Computer networks)
- Label
- Advanced monitoring in P2P botnets : a dual perspective, Shankar Karuppayah, (electronic book) | (electronic book)
- Bibliography note
- Includes bibliographical references
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Foreword; Preface; Acknowledgements; Contents; Acronyms; 1 Introduction; 1.1 Botnet Architectures; 1.1.1 Centralized Botnets; 1.1.2 Decentralized Botnets; 1.1.3 P2P Botnets; 1.2 P2P Botnet Monitoring; 1.3 Outline; References; 2 Requirements and State of the Art; 2.1 Requirements of a Botnet Monitoring Mechanism; 2.1.1 Functional Requirements; 2.1.2 Non-functional Requirements; 2.2 Formal Model for P2P Botnets; 2.3 Related Work on Botnet Monitoring; 2.3.1 Honeypots; 2.3.2 Crawlers; 2.3.3 Sensor Nodes; 2.4 Challenges in Botnet Monitoring; 2.4.1 The Dynamic Nature of P2P Botnets
- 2.4.2 Noise from Unknown Third Party Monitoring Activities2.4.3 Anti-monitoring Mechanisms; 2.5 Summary; References; 3 The Anatomy of P2P Botnets; 3.1 Dissecting GameOver Zeus; 3.1.1 Bootstrapping Process; 3.1.2 Membership Maintenance Mechanism; 3.1.3 Blacklisting Mechanism; 3.2 Dissecting Sality; 3.2.1 Bootstrapping Process; 3.2.2 Membership Management Mechanism; 3.3 Dissecting ZeroAccess; 3.3.1 Bootstrapping Process; 3.3.2 Membership Management Mechanism; 3.4 Summary; References; 4 Crawling Botnets; 4.1 Circumventing Anti-crawling Mechanisms
- 4.1.1 Restricted NL Reply Mechanism of GameOver Zeus4.1.2 Less Invasive Crawling Algorithm (LICA); 4.2 Advanced Anti-crawling Countermeasures; 4.2.1 Enhancing GameOver Zeus' NL Restriction Mechanism; 4.2.2 BoobyTrap: Detecting Persistent Crawlers; 4.3 Evaluation; 4.3.1 Evaluation of ZeusMilker; 4.3.2 Evaluation of the Less Invasive Crawling Algorithm (LICA); 4.3.3 Evaluation of the BoobyTrap Mechanism; 4.4 Summary; References; 5 Deployment of Sensor Nodes in Botnets; 5.1 Detecting Sensor Nodes in Botnets; 5.1.1 Introduction; 5.1.2 Local Clustering Coefficient (LCC); 5.1.3 SensorRanker
- 5.1.4 SensorBuster5.2 Circumventing Sensor Detection Mechanisms; 5.2.1 Circumventing LCC; 5.2.2 Evading SensorRanker; 5.2.3 Evading SensorBuster; 5.3 Evaluation; 5.3.1 Datasets; 5.3.2 Experimental Setup; 5.3.3 Research Questions and Expectations; 5.3.4 Results; 5.4 Summary; References; 6 Conclusion and Outlook; 6.1 Conclusion; 6.2 Outlook
- Dimensions
- unknown
- Extent
- 1 online resource.
- Form of item
- online
- Isbn
- 9789811090509
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-981-10-9050-9
- Specific material designation
- remote
- System control number
-
- on1036733978
- (OCoLC)1036733978
- Label
- Advanced monitoring in P2P botnets : a dual perspective, Shankar Karuppayah, (electronic book) | (electronic book)
- Bibliography note
- Includes bibliographical references
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Foreword; Preface; Acknowledgements; Contents; Acronyms; 1 Introduction; 1.1 Botnet Architectures; 1.1.1 Centralized Botnets; 1.1.2 Decentralized Botnets; 1.1.3 P2P Botnets; 1.2 P2P Botnet Monitoring; 1.3 Outline; References; 2 Requirements and State of the Art; 2.1 Requirements of a Botnet Monitoring Mechanism; 2.1.1 Functional Requirements; 2.1.2 Non-functional Requirements; 2.2 Formal Model for P2P Botnets; 2.3 Related Work on Botnet Monitoring; 2.3.1 Honeypots; 2.3.2 Crawlers; 2.3.3 Sensor Nodes; 2.4 Challenges in Botnet Monitoring; 2.4.1 The Dynamic Nature of P2P Botnets
- 2.4.2 Noise from Unknown Third Party Monitoring Activities2.4.3 Anti-monitoring Mechanisms; 2.5 Summary; References; 3 The Anatomy of P2P Botnets; 3.1 Dissecting GameOver Zeus; 3.1.1 Bootstrapping Process; 3.1.2 Membership Maintenance Mechanism; 3.1.3 Blacklisting Mechanism; 3.2 Dissecting Sality; 3.2.1 Bootstrapping Process; 3.2.2 Membership Management Mechanism; 3.3 Dissecting ZeroAccess; 3.3.1 Bootstrapping Process; 3.3.2 Membership Management Mechanism; 3.4 Summary; References; 4 Crawling Botnets; 4.1 Circumventing Anti-crawling Mechanisms
- 4.1.1 Restricted NL Reply Mechanism of GameOver Zeus4.1.2 Less Invasive Crawling Algorithm (LICA); 4.2 Advanced Anti-crawling Countermeasures; 4.2.1 Enhancing GameOver Zeus' NL Restriction Mechanism; 4.2.2 BoobyTrap: Detecting Persistent Crawlers; 4.3 Evaluation; 4.3.1 Evaluation of ZeusMilker; 4.3.2 Evaluation of the Less Invasive Crawling Algorithm (LICA); 4.3.3 Evaluation of the BoobyTrap Mechanism; 4.4 Summary; References; 5 Deployment of Sensor Nodes in Botnets; 5.1 Detecting Sensor Nodes in Botnets; 5.1.1 Introduction; 5.1.2 Local Clustering Coefficient (LCC); 5.1.3 SensorRanker
- 5.1.4 SensorBuster5.2 Circumventing Sensor Detection Mechanisms; 5.2.1 Circumventing LCC; 5.2.2 Evading SensorRanker; 5.2.3 Evading SensorBuster; 5.3 Evaluation; 5.3.1 Datasets; 5.3.2 Experimental Setup; 5.3.3 Research Questions and Expectations; 5.3.4 Results; 5.4 Summary; References; 6 Conclusion and Outlook; 6.1 Conclusion; 6.2 Outlook
- Dimensions
- unknown
- Extent
- 1 online resource.
- Form of item
- online
- Isbn
- 9789811090509
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-981-10-9050-9
- Specific material designation
- remote
- System control number
-
- on1036733978
- (OCoLC)1036733978
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Advanced-monitoring-in-P2P-botnets--a-dual/HPYmqINzttA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Advanced-monitoring-in-P2P-botnets--a-dual/HPYmqINzttA/">Advanced monitoring in P2P botnets : a dual perspective, Shankar Karuppayah, (electronic book) | (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Advanced monitoring in P2P botnets : a dual perspective, Shankar Karuppayah, (electronic book) | (electronic book)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Advanced-monitoring-in-P2P-botnets--a-dual/HPYmqINzttA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Advanced-monitoring-in-P2P-botnets--a-dual/HPYmqINzttA/">Advanced monitoring in P2P botnets : a dual perspective, Shankar Karuppayah, (electronic book) | (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>