000 | 03596nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-1-4471-5216-3 | ||
003 | DE-He213 | ||
005 | 20200421112224.0 | ||
007 | cr nn 008mamaa | ||
008 | 130703s2013 xxk| s |||| 0|eng d | ||
020 |
_a9781447152163 _9978-1-4471-5216-3 |
||
024 | 7 |
_a10.1007/978-1-4471-5216-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aTiirmaa-Klaar, Heli. _eauthor. |
|
245 | 1 | 0 |
_aBotnets _h[electronic resource] / _cby Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini. |
264 | 1 |
_aLondon : _bSpringer London : _bImprint: Springer, _c2013. |
|
300 |
_aVIII, 97 p. 5 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Cybersecurity, _x2193-973X |
|
505 | 0 | _aForeword -- Botnets, Cybercrime and National Security -- Botnets: How to Fight the Ever-growing Threat on a Technical Level. | |
520 | _aMalware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. Botnets provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts. The non-technical section addresses how botnet infrastructure could be exploited for national security and cybercrime purposes. It approaches the subject as a public policy issue and analyzes the phenomenon of botnets from national security, law enforcement and regulatory policy perspectives, and makes recommendations for policy-makers on different public policies, highlighting the need for international response mechanisms. The technical section provides insight into current botnet techniques and discusses state-of-the-art countermeasures to combat the botnet threat in detail. It includes new detection methods as well as different approaches to actively compromise running botnets. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer organization. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputers. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Systems Organization and Communication Networks. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
700 | 1 |
_aGassen, Jan. _eauthor. |
|
700 | 1 |
_aGerhards-Padilla, Elmar. _eauthor. |
|
700 | 1 |
_aMartini, Peter. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781447152156 |
830 | 0 |
_aSpringerBriefs in Cybersecurity, _x2193-973X |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4471-5216-3 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c57594 _d57594 |