Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Botnets

Botnets

Tiirmaa-Klaar, H., Gassen, J., Gerhards-Padilla, E., Martini, P.

2013, VIII, 97 p. 5 illus.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$29.99

(net) price for USA

ISBN 978-1-4471-5216-3

digitally watermarked, no DRM

Included Format: PDF and EPUB

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$39.99

(net) price for USA

ISBN 978-1-4471-5215-6

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities.

Botnets provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts.

The non-technical section addresses how botnet infrastructure could be exploited for national security and cybercrime purposes. It approaches the subject as a public policy issue and analyzes the phenomenon of botnets from national security, law enforcement and regulatory policy perspectives, and makes recommendations for policy-makers on different public policies, highlighting the need for international response mechanisms.

The technical section provides insight into current botnet techniques and discusses state-of-the-art countermeasures to combat the botnet threat in detail. It includes new detection methods as well as different approaches to actively compromise running botnets.

Content Level » Research

Keywords » Analysis - Botnets - Conficker - Countermeasures - Cyber Attacks - Cyber Security - Cybercrime - Cybercrime Legislation - Malware - Stuxnet

Related subjects » Communication Networks - Information Systems and Applications - Security and Cryptology

Table of contents / Sample pages 

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Systems and Data Security.