51,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
26 °P sammeln
  • Broschiertes Buch

Current methods for detection of malicious software rely on large databases of "signatures" for variations of every known computer virus. When such virus infects a system, the antivirus reacts by removing the threat. Such reactive methods leave computer systems defenseless against new, previously unknown attacks. Constant increase in the number of new attacks calls for new proactive methods of detection of modern computer security threats. This book addresses the complexity issues in the design of modern proactive malware detection systems. A distinct biological immunology theme runs…mehr

Produktbeschreibung
Current methods for detection of malicious software
rely on large databases of "signatures" for
variations of every known computer virus. When such
virus infects a system, the antivirus reacts by
removing the threat. Such reactive methods leave
computer systems defenseless against new, previously
unknown attacks. Constant increase in the number of
new attacks calls for new proactive methods of
detection of modern computer security threats. This
book addresses the complexity issues in the design of
modern proactive malware detection systems. A
distinct biological immunology theme runs throughout
this work. Computer viruses are very similar in their
manifestation to biological parasites. After first
building the basis for understanding how modern
malicious software operates, the book then introduces
a detailed taxonomy of self-replication behavior in
malware with code samples and basic algorithms,
describes the application of the self-replication to
script viruses and expands the concept to the
detection of compiled executable malware. The book
completes with description of a novel design of an
experimental virtual laboratory for computer and
network security analysis and research.
Autorenporträt
Alexander Volynkin, Ph.D., is a senior software engineer for
BitArmor Systems Inc, where he has been designing and
implementing cryptographic solutions and filter drivers for
BitArmor DataControl product. He also serves on the advisory
board of the Center for Advance Information Technologies at
Binghamton University.