作者: Jose Nazario
DOI:
关键词: Direct attack 、 The Internet 、 Strengths and weaknesses 、 Computer security 、 Traffic analysis 、 Honeypot 、 Host (network) 、 Application layer 、 Variety (cybernetics) 、 Computer science
摘要: This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in field. ground-breaking volume enables to put rising trends into perspective with practical information defense techniques utilizing data from live networks, real IP addresses, commercial tools. The helps understand classifications groupings of offers a deeper understanding how they threaten network system security. After examining constructed its major life cycle steps are implemented, scrutinizes targets that worms have attacked over years, likely immediate future. Moreover, this unique reference explains detect using variety mechanisms, evaluates strengths weaknesses three approaches - traffic analysis, honeypots dark monitors, signature analysis. concludes discussion four effective defenses against including host-based defenses, firewalls filters, application layer proxies, direct attack itself.