Browse content
Table of contents
Actions for selected chapters
- Full text access
- Book chapterNo access
Chapter 1 - Botnets: A Call to Action
Pages 1-27 - Book chapterNo access
Chapter 2 - Botnets Overview
Pages 29-75 - Book chapterNo access
Chapter 3 - Alternative Botnet C&Cs
Pages 77-95 - Book chapterNo access
Chapter 4 - Common Botnets
Pages 97-132 - Book chapterNo access
Chapter 5 - Botnet Detection: Tools and Techniques
Pages 133-215 - Book chapterNo access
Chapter 6 - Ourmon: Overview and Installation
Pages 217-243 - Book chapterNo access
Chapter 7 - Ourmon: Anomaly Detection Tools
Pages 245-283 - Book chapterNo access
Chapter 8 - IRC and Botnets
Pages 285-312 - Book chapterNo access
Chapter 9 - Advanced Ourmon Techniques
Pages 313-343 - Book chapterNo access
Chapter 10 - Using Sandbox Tools for Botnets
Pages 345-390 - Book chapterNo access
Chapter 11 - Intelligence Resources
Pages 391-415 - Book chapterNo access
Chapter 12 - Responding to Botnets
Pages 417-452 - Book chapterNo access
Appendix A - FSTC Phishing Solutions Categories
Pages 453-458 - Book chapterNo access
Index
Pages 459-464
About the book
Description
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.
Key Features
- This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise
- Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself
- This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise
- Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself
Details
ISBN
978-1-59749-135-8
Language
English
Published
2007
Copyright
Copyright © 2007 Elsevier Inc. All rights reserved
Imprint
Syngress