Advanced Monitoring in P2P Botnets

A Dual Perspective

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Advanced Monitoring in P2P Botnets by Shankar Karuppayah, Springer Singapore
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Shankar Karuppayah ISBN: 9789811090509
Publisher: Springer Singapore Publication: May 17, 2018
Imprint: Springer Language: English
Author: Shankar Karuppayah
ISBN: 9789811090509
Publisher: Springer Singapore
Publication: May 17, 2018
Imprint: Springer
Language: English

This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.

More books from Springer Singapore

Cover of the book Optical and Wireless Technologies by Shankar Karuppayah
Cover of the book Statistics and its Applications by Shankar Karuppayah
Cover of the book Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT by Shankar Karuppayah
Cover of the book Nature Inspired Computing by Shankar Karuppayah
Cover of the book Principles and Applications of RELAX: A Robust and Universal Estimator by Shankar Karuppayah
Cover of the book Calling Taikong: A Strategy Report and Study of China's Future Space Science Missions by Shankar Karuppayah
Cover of the book Fundamentals of Military Law by Shankar Karuppayah
Cover of the book Iterative Learning Control with Passive Incomplete Information by Shankar Karuppayah
Cover of the book Cancer Nanotheranostics by Shankar Karuppayah
Cover of the book Cognitive Systems and Signal Processing by Shankar Karuppayah
Cover of the book Transactions on Engineering Technologies by Shankar Karuppayah
Cover of the book Digital Image Forensics by Shankar Karuppayah
Cover of the book Biodiversity Conservation Using Umbrella Species by Shankar Karuppayah
Cover of the book Solar Desalination Technology by Shankar Karuppayah
Cover of the book Recent Advances in Mathematical Sciences by Shankar Karuppayah
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy