Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Honeypots and Routers: Collecting Internet Attacks

Buy

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment.

Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security:

  • Computer networks: technologies, routing protocols, and Internet architecture
  • Information and network security: concepts, challenges, and mechanisms
  • System vulnerability levels: network, operating system, and applications

The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it.

The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

(HTML tags aren't allowed.)

Principles of Wireless Networks: A Unified Approach (Prentice Hall Communications Engineering and Emerging Technologies Series)
Principles of Wireless Networks: A Unified Approach (Prentice Hall Communications Engineering and Emerging Technologies Series)
For upper level undergraduate Electrical Engineering, Computer Science, Telecommunications or Information Science courses that focus on wireless communications technology, as well as a reference for technicians and other professionals in the wireless industry.Takes a unified and comprehensive approach to introducing the full spectrum of engineering...
Emerging Markets For Dummies
Emerging Markets For Dummies
We live in a big world. Most of the people who share space on this planet live in countries that are less developed than the United States or such other big industrialized nations as Australia, Canada, England, France, and Japan. Instead, they live in Brazil, China, India, Russia, or any of the other nations that are manufacturing goods,...
Advances in Dynamic Games: Theory, Applications, and Numerical Methods
Advances in Dynamic Games: Theory, Applications, and Numerical Methods

This contributed volume focuses on aspects of dynamic game theory including differential games, evolutionary games, and stochastic games. It covers theoretical developments, algorithmic methods, and applications to fields as varied as mathematical biology, environmental management, economics, engineering, guidance and control, and social...


Practical Android 4 Games Development
Practical Android 4 Games Development
Hi there, and welcome to the world of Android game development. You came here to learn about game development on Android, and we hope to be the people who enable you to realize your ideas.

Together we'll cover quite a range of materials and topics: Android basics, audio and graphics programming, a little math
...
Negation and Speculation Detection (Natural Language Processing)
Negation and Speculation Detection (Natural Language Processing)
Negation and speculation detection is an emerging topic that has attracted the attention of many researchers, and there is clearly a lack of relevant textbooks and survey texts. This book aims to define negation and speculation from a natural language processing perspective, to explain the need for processing these phenomena, to summarise...
Beginning Object-Oriented Programming with VB 2005: From Novice to Professional
Beginning Object-Oriented Programming with VB 2005: From Novice to Professional

It has been my experience as a Visual Basic trainer that most people do not have trouble picking up the syntax of the language. What perplexes and frustrates many people are the higher-level concepts of object-oriented programming methodology and design. To compound the problem, most introductory programming books and training...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy