Cover for Botnets

Botnets

The Killer Web App

Book2007

Authors:

Craig A. Schiller, Jim Binkley, ... Michael Cross

Botnets

The Killer Web App

Book2007

 

Cover for Botnets

Authors:

Craig A. Schiller, Jim Binkley, ... Michael Cross

Browse this book

Book description

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterNo access

    Chapter 1 - Botnets: A Call to Action

    Pages 1-27

  3. Book chapterNo access

    Chapter 2 - Botnets Overview

    Pages 29-75

  4. Book chapterNo access

    Chapter 3 - Alternative Botnet C&Cs

    Pages 77-95

  5. Book chapterNo access

    Chapter 4 - Common Botnets

    Pages 97-132

  6. Book chapterNo access

    Chapter 5 - Botnet Detection: Tools and Techniques

    Pages 133-215

  7. Book chapterNo access

    Chapter 6 - Ourmon: Overview and Installation

    Pages 217-243

  8. Book chapterNo access

    Chapter 7 - Ourmon: Anomaly Detection Tools

    Pages 245-283

  9. Book chapterNo access

    Chapter 8 - IRC and Botnets

    Pages 285-312

  10. Book chapterNo access

    Chapter 9 - Advanced Ourmon Techniques

    Pages 313-343

  11. Book chapterNo access

    Chapter 10 - Using Sandbox Tools for Botnets

    Pages 345-390

  12. Book chapterNo access

    Chapter 11 - Intelligence Resources

    Pages 391-415

  13. Book chapterNo access

    Chapter 12 - Responding to Botnets

    Pages 417-452

  14. Book chapterNo access

    Appendix A - FSTC Phishing Solutions Categories

    Pages 453-458

  15. Book chapterNo access

    Index

    Pages 459-464

About the book

Description

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.

Key Features

  • This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise
  • Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself
  • This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise
  • Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself

Details

ISBN

978-1-59749-135-8

Language

English

Published

2007

Copyright

Copyright © 2007 Elsevier Inc. All rights reserved

Imprint

Syngress

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Purchase the book

Authors

Craig A. Schiller

Jim Binkley

David Harley

Gadi Evron

Tony Bradley

Carsten Willems

Michael Cross