The growth of network and Internet technologies has brought a paradigm shift the way data and information transfer takes place in network. With real data & information, some unwarranted programs may also enter into our network system without our knowledge.These unwarranted programs are called malware.They pose a major security challenges to legitimate users. Therefore it is very important to study their propagation dynamics & detection mechanism to fight against them and find an optimal defence solution to cover a wide spectrum of malware.Towards this goal this book studies worm propagation modelling,worm detection and worm containment.The propagation modelling will help in analysing malicious traffic and their characteristics, which in turn helps in building necessary defence mechanism to thwart an malicious attack. A hybrid approach of detection,combining both, signature-based and anomaly-based detection adopted in this book gives the advantage of both techniques in automated signature generation of zero-day worms.This study will help any individual or organization that is interested in a comprehensive cyber defence solution to protect their digital resources from malware attack.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.