Automatic defense against zero-day polymorphic worms in communication networks:
"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton [u.a.]
CRC Press
2013
|
Schlagworte: | |
Online-Zugang: | Cover Inhaltsverzeichnis |
Zusammenfassung: | "A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- "Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of double-honeynet systems. It also discusses experimental implementation of signature-generation algorithms. "-- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XVIII, 319 S. Ill. |
ISBN: | 9781466557277 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041086363 | ||
003 | DE-604 | ||
005 | 20130708 | ||
007 | t | ||
008 | 130613s2013 a||| |||| 00||| eng d | ||
010 | |a 2012044400 | ||
020 | |a 9781466557277 |c hardback |9 978-1-4665-5727-7 | ||
035 | |a (OCoLC)854727018 | ||
035 | |a (DE-599)GBV737610085 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Mohammed, Mohssen |d 1982- |e Verfasser |0 (DE-588)1036606244 |4 aut | |
245 | 1 | 0 | |a Automatic defense against zero-day polymorphic worms in communication networks |c Mohssen Mohammed ; Al-Sakib Khan Pathan |
264 | 1 | |a Boca Raton [u.a.] |b CRC Press |c 2013 | |
300 | |a XVIII, 319 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 1 | |a "A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- | |
520 | 1 | |a "Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of double-honeynet systems. It also discusses experimental implementation of signature-generation algorithms. "-- | |
650 | 0 | 7 | |a Computervirus |0 (DE-588)4214774-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Algorithmus |0 (DE-588)4001183-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computervirus |0 (DE-588)4214774-8 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Algorithmus |0 (DE-588)4001183-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Pathan, Al-Sakib Khan |e Sonstige |4 oth | |
856 | 4 | |u http://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146655/9781466557277.jpg |3 Cover | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063046&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026063046 |
Datensatz im Suchindex
_version_ | 1804150460344434688 |
---|---|
adam_text | Contents
Preface
About the Authors
Chapter
1
The Fundamental Concepts
1.1
Introduction
1.1.1
Network Security Concepts
1.1.2
Automated Signature Generation
for Zero-day Polymorphic Worms
1.2
Our Experience and This Book s Objective
Chapter
2
References
Computer
Networking
2.1
Computer Technologies
2.2
Network Topology
2.2.1
Point-to-Point Topology
2.2.2
Daisy-Chain Topology
2.2.3
Bus (Point-to-Multipoint) Topology
2.2.4
Distributed Bus Topology
2.2.5
Ring Topology
2.2.6
Dual-Ring Topology
2.2.7
Star Topology
2.2.8
Star-Wired Bus Topology
2.2.9
Star-Wired Ring Topology
2.2.10
Mesh Topology
2.2.11
Hierarchical or Tree Topology
2.2.12
Dual-Homing Topology
Xlii
xvii
1
1
1
20
22
23
25
25
26
26
27
27
27
29
29
29
30
31
32
32
32
VII
VIII
CONTENTS
2.3
Internet Protocol
2.4 Transmission
Control Protocol
2.5
IP Routers
2.6
Ethernet
Switch
2.7
IP Routing and Routing Table
2.8
Discussion on Router
2.8.1
Access Mechanisms for Administrators
2.8.2
Security Policy for a Router
2.8.3
Router Security Policy Checklist
2.9
Network Traffic Filtering
2.9.1
Packet Filtering
2.9.2
Source Routing
2.10
Tools Used for Traffic Filtering or Network Monitoring
2.10.1
Packet Capture
2.11
Concluding Remarks
References
Chapter
3
Intrusion Detection and Prevention
Systems (IDPSs)
3.1
Introduction
3.2
IDPS Detection Methods
3.2.1
Signature-Based Detection
3.2.2
Anomaly-Based Detection
3.2.3
Stateful Protocol Analysis
3.3
IDPS Components
3.4
IDPS Security Capabilities
3.5
Types of IDPS Technologies
3.5.1
Network-Based IDPSs
3.5.2
Wireless IDPSs
3.5.3
NBA Systems
3.5.4
Host-Based IDPS
3.6
Integration of Multiple IDPSs
3.6.1
Multiple IDPS Technologies
3.6.2
Integration of Different IDPS Products
3.7
IDPS Products
3.7.1
Common Enterprise Network-Based IDPSs
3.7.2
Common Enterprise Wireless IDPSs
3.7.3
Common Enterprise NBA Systems
3.7.4
Common Enterprise Host-Based IDPSs
3.8
Concluding Remarks
References
Chapter
4
Honeypots
4.1
Definition and History of Honeypots
4.1.1
Honeypot and Its Working Principle
4.1.2
History of Honeypots
4.1.3
Types of Honeypots
34
34
35
35
36
37
37
38
40
42
42
43
43
44
44
45
47
47
54
54
55
57
59
60
61
62
66
70
73
77
77
78
78
78
78
78
78
83
83
85
85
85
89
95
CONTENTS
IX
4.2
Types of Threats
96
4.2.1
Script Kiddies and Advanced
Blackhat
Attacks
96
4.2.2
Attackers Motivations
100
4.3
The Value of Honeypots
101
4.3.1
Advantages of Honeypots
101
4.3.2
Disadvantages of Honeypots
104
4.3.3
Roles of Honeypots in Network Security
105
4.4
Honeypot Types Based on Interaction Level
109
4.4.1
Low-Interaction Honeypots
110
4.4.2
High-Interaction Honeypots 111
4.4.3
Medium-Interaction Honeypots
112
4.5
An Overview of Five Honeypots
113
4.5.1
BackOfficer Friendly
113
4.5.2
Specter
113
4.5.3
Honeyd
114
4.5.4
ManTrap
114
4.5.5
Honeynets
115
4.6
Conclusion
123
References
124
Chapter
5
Internet Worms
127
5.1
Introduction
127
5.2
Infection
127
5.2.1
Code Injection
128
5.2.2
Edge Injection
130
5.2.3
Data Injection
133
5.3
Spreading
134
5.4
Hiding
136
5.4.1
Traffic Shaping
136
5.4.2
Polymorphism
137
5.4.3
Fingerprinting
138
5.5
Worm Components
139
5.5.1
Reconnaissance
139
5.5.2
Attack Components
139
5.5.3
Communication Components
139
5.5.4
Command Components
140
5.5.5
Intelligence Capabilities
140
5.6
Worm Life
140
5.6.1
Random Scanning
141
5.6.2
Random Scanning Using Lists
142
5.6.3
Island Hopping
142
5.6.4
Directed Attacking
142
5.6.5
Hit-List Scanning
143
5.7
Polymorphic Worms: Definition and Anatomy
143
5.7.1
Polymorphic Worm Definition
143
5.7.2
Polymorphic Worm Structure
143
5.7.3
Invariant Bytes
144
CONTENTS
Chapter
6
Chapter
7
5.9
5.7.4
Polymorphic Worm Techniques
5.7.5
Signature Classes for Polymorphic Worms
Internet Worm Prevention Methods
5.8.1
Prevention of Vulnerabilities
5.8.2
Prevention of Exploits
Conclusion
References
Reading Resources on Automated
Signature Generation Systems
6.1
Introduction
6.1.1
6.1.2
6.1.3
References
Hybrid System (Network Based and Host
Based)
Network-Based Mechanisms
Host-Based Mechanisms
Signature Generation Algorithms
for Polymorphic Worms
7.1
String Matching
7.1.1
Exact String-Matching Algorithms
7.1.2
Approximate String-Matching Algorithms
7.2
Machine Learning
7.2.1
Supervised Learning
7.2.2
Algorithm Selection
7.2.3
Logic-Based Algorithms
7.2.4
Learning Set of Rules
7.2.5
Statistical Learning Algorithms
7.2.6
Support Vector Machines
7.3
Unsupervised Learning
7.3.1
A Brief Introduction to Unsupervised
Learning
7.3.2
Dimensionality Reduction and Clustering
Models
7.3.3
Expectation-Maximization Algorithm
7.3.4
Modeling Time Series and Other Structured
Data
7.3.5
Nonlinear, Factorial, and Hierarchical Models
7.3.6
Intractability
7.3.7
Graphical Models
7.3.8
Exact Inference in Graphs
7.3.9
Learning in Graphical Models
7.3.10
Bayesian Model Comparison and
Occam s Razor
7.4
Concluding Remark
References
144
148
149
149
151
152
153
159
159
160
161
164
165
169
169
170
179
185
185
189
191
195
202
208
212
212
219
224
227
234
235
236
241
248
252
254
254
CONTENTS
XI
Chapter
8
Chapter
9
Zero-day Polymorphic Worm
Collection Method
8.1
Introduction
8.2
Motivation for the Double-Honeynet System
8.3
Double-Honeynet Architecture
8.4
Software
8.4.1
Honeywall
Roo
CD-ROM
8.4.2
Sebek
8.4.3
Snort_inline
8.5
Double-Honeynet System Configurations
8.5.1
Implementation of Double-Honeynet
Architecture
8.5.2
Double-Honeynet Configurations
8.6
Chapter Summary
References
Developed Signature Generation
Algorithms
9.1
Introduction
9.2
An Overview and Motivation for Using String
Matching
9.3
The Knuth-Morris-Pratt Algorithm
9.3.1
Proposed Substring Extraction Algorithm
9.3.2
A Modified Knuth-Morris-Pratt Algorithm
9.3.3
Testing the Quality of the Generated
Signature for Polymorphic Worm A
9.4
Modified Principal Component Analysis
9.4.1
An Overview of and Motivation for Using
PCA in Our Work
9.4.2
Our Contributions in the PCA
9.4.3
Determination of Frequency Counts
9.4.4
Using PCA to Determine the Most
Significant Data for Polymorphic Worm
Instances
9.4.5
Testing the Quality
oí
the Generated
Signature for Polymorphic Worm A
9.5
Clustering Method for Different Types of
Polymorphic Worms
9.6
Signature Generation Algorithm Pseudocodes
9.6.1
Signature Generation Process
9.6.2
Testing the Quality of the Generated
Signature for Polymorphic Worm
Л
9.7
Chapter Summary
9.8
Conclusion and Recommendations for Future Work
References
Index
261
261
261
262
264
264
265
265
266
266
267
274
274
277
277
278
279
280
282
282
283
283
283
284
284
287
287
288
288
294
295
295
296
297
|
any_adam_object | 1 |
author | Mohammed, Mohssen 1982- |
author_GND | (DE-588)1036606244 |
author_facet | Mohammed, Mohssen 1982- |
author_role | aut |
author_sort | Mohammed, Mohssen 1982- |
author_variant | m m mm |
building | Verbundindex |
bvnumber | BV041086363 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)854727018 (DE-599)GBV737610085 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03199nam a2200457 c 4500</leader><controlfield tag="001">BV041086363</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130708 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130613s2013 a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2012044400</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466557277</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-4665-5727-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)854727018</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV737610085</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mohammed, Mohssen</subfield><subfield code="d">1982-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1036606244</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Automatic defense against zero-day polymorphic worms in communication networks</subfield><subfield code="c">Mohssen Mohammed ; Al-Sakib Khan Pathan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 319 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"--</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of double-honeynet systems. It also discusses experimental implementation of signature-generation algorithms. "--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Algorithmus</subfield><subfield code="0">(DE-588)4001183-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Algorithmus</subfield><subfield code="0">(DE-588)4001183-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pathan, Al-Sakib Khan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146655/9781466557277.jpg</subfield><subfield code="3">Cover</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063046&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026063046</subfield></datafield></record></collection> |
id | DE-604.BV041086363 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:39:16Z |
institution | BVB |
isbn | 9781466557277 |
language | English |
lccn | 2012044400 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026063046 |
oclc_num | 854727018 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | XVIII, 319 S. Ill. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | CRC Press |
record_format | marc |
spelling | Mohammed, Mohssen 1982- Verfasser (DE-588)1036606244 aut Automatic defense against zero-day polymorphic worms in communication networks Mohssen Mohammed ; Al-Sakib Khan Pathan Boca Raton [u.a.] CRC Press 2013 XVIII, 319 S. Ill. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index "A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- "Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of double-honeynet systems. It also discusses experimental implementation of signature-generation algorithms. "-- Computervirus (DE-588)4214774-8 gnd rswk-swf Algorithmus (DE-588)4001183-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computervirus (DE-588)4214774-8 s Computersicherheit (DE-588)4274324-2 s Algorithmus (DE-588)4001183-5 s DE-604 Pathan, Al-Sakib Khan Sonstige oth http://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146655/9781466557277.jpg Cover Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063046&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Mohammed, Mohssen 1982- Automatic defense against zero-day polymorphic worms in communication networks Computervirus (DE-588)4214774-8 gnd Algorithmus (DE-588)4001183-5 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4214774-8 (DE-588)4001183-5 (DE-588)4274324-2 (DE-588)4070085-9 |
title | Automatic defense against zero-day polymorphic worms in communication networks |
title_auth | Automatic defense against zero-day polymorphic worms in communication networks |
title_exact_search | Automatic defense against zero-day polymorphic worms in communication networks |
title_full | Automatic defense against zero-day polymorphic worms in communication networks Mohssen Mohammed ; Al-Sakib Khan Pathan |
title_fullStr | Automatic defense against zero-day polymorphic worms in communication networks Mohssen Mohammed ; Al-Sakib Khan Pathan |
title_full_unstemmed | Automatic defense against zero-day polymorphic worms in communication networks Mohssen Mohammed ; Al-Sakib Khan Pathan |
title_short | Automatic defense against zero-day polymorphic worms in communication networks |
title_sort | automatic defense against zero day polymorphic worms in communication networks |
topic | Computervirus (DE-588)4214774-8 gnd Algorithmus (DE-588)4001183-5 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computervirus Algorithmus Computersicherheit Rechnernetz |
url | http://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146655/9781466557277.jpg http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063046&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT mohammedmohssen automaticdefenseagainstzerodaypolymorphicwormsincommunicationnetworks AT pathanalsakibkhan automaticdefenseagainstzerodaypolymorphicwormsincommunicationnetworks |