Advanced Monitoring in P2P Botnets Advanced Monitoring in P2P Botnets
SpringerBriefs on Cyber Security Systems and Networks

Advanced Monitoring in P2P Botnets

A Dual Perspective

    • €52.99
    • €52.99

Publisher Description

This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.

GENRE
Computing & Internet
RELEASED
2018
17 May
LANGUAGE
EN
English
LENGTH
122
Pages
PUBLISHER
Springer Nature Singapore
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
3.1
MB
Botnet Detection Botnet Detection
2007
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments
2017
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2019
Information Security Applications Information Security Applications
2014
International Conference on Security and Privacy in Communication Networks International Conference on Security and Privacy in Communication Networks
2015
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2018
Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning
2022
Privacy-Preserving Deep Learning Privacy-Preserving Deep Learning
2021
Design and Cryptanalysis of ZUC Design and Cryptanalysis of ZUC
2021
Cybersecurity in Digital Transformation Cybersecurity in Digital Transformation
2020
Location Privacy in Mobile Applications Location Privacy in Mobile Applications
2018
Big Digital Forensic Data Big Digital Forensic Data
2018