Skip to main content
  • Book
  • © 2008

Vulnerability Analysis and Defense for the Internet

  • Includes detail vulnerabilities in an application and how the vulnerability affects the software
  • Provides a source code for effective signatures to prevent vulnerabilities
  • Includes supplementary material: sn.pub/extras

Part of the book series: Advances in Information Security (ADIS, volume 37)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (9 chapters)

  1. Front Matter

    Pages I-XVI
  2. Wireless Security

    • Abhishek Singh, Baibhav Singh, Hirosh Joseph
    Pages 1-46
  3. Vulnerability Analysis for Mail Protocols

    • Abhishek Singh, Baibhav Singh, Hirosh Joseph
    Pages 47-70
  4. Vulnerability Analysis for FTP and TFTP

    • Abhishek Singh, Baibhav Singh, Hirosh Joseph
    Pages 71-77
  5. Vulnerability Analysis for HTTP

    • Abhishek Singh, Baibhav Singh, Hirosh Joseph
    Pages 79-110
  6. Vulnerability Analysis for DNS and DHCP

    • Abhishek Singh, Baibhav Singh, Hirosh Joseph
    Pages 111-124
  7. Vulnerability Analysis for SNMP and LDAP

    • Abhishek Singh, Baibhav Singh, Hirosh Joseph
    Pages 125-134
  8. Vulnerability Analysis for RPC

    • Abhishek Singh, Baibhav Singh, Hirosh Joseph
    Pages 135-167
  9. Malware Analysis

    • Abhishek Singh, Baibhav Singh, Hirosh Joseph
    Pages 169-211
  10. Reverse Engineering

    • Abhishek Singh, Baibhav Singh, Hirosh Joseph
    Pages 213-251
  11. Back Matter

    Pages 253-254

About this book

Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in vulnerability (see the news link on security focus http://www.securityfocus.com/brief/614). In January 2007, a vulnerable network resulted in a theft of 45.6 million credit card numbers in TJX companies due to unauthorized intrusion. A good protocol analysis and effective signature writing is one of the - fective method to prevent vulnerability and minimize the chances of intrusion in the network. However, protocol analysis poses two challenges namely false po- tive and evasion. If the signature to prevent the vulnerability is not written pr- erly, it will result in dropping of a valid traffic thereby resulting in false positive. An effective signature should also consider the chances of evasion; otherwise a malicious attacker can use the variant of exploit and evade the protection provided by the IDS/IPS.

Editors and Affiliations

  • SafeNet Infotech Pvt.Ltd., Noida - 201301, India

    Abhishek Singh, Baibhav Singh

  • Third Brigade, Ottawa, Canada

    Hirosh Joseph

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access