Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtual Honeypots: From Botnet Tracking to Intrusion Detection

Buy
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain.

In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you’ll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you’ve never deployed a honeypot before.

You’ll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation.

After reading this book, you will be able to

  • Compare high-interaction honeypots that provide real systems and services and the low-interaction honeypots that emulate them
  • Install and configure Honeyd to simulate multiple operating systems, services, and network environments
  • Use virtual honeypots to capture worms, bots, and other malware
  • Create high-performance "hybrid" honeypots that draw on technologies from both low- and high-interaction honeypots
  • Implement client honeypots that actively seek out dangerous Internet locations
  • Understand how attackers identify and circumvent honeypots
  • Analyze the botnets your honeypot identifies, and the malware it captures
  • Preview the future evolution of both virtual and physical honeypots
About the Author

Niels Provos received a Ph.D. from the University of Michigan in 2003, where he studied experimental and theoretical aspects of computer and network security. He is one of the OpenSSH creators and known for his security work on OpenBSD. He developed Honeyd, a popular open source honeypot platform; SpyBye, a client honeypot that helps web masters to detect malware on their web pages; and many other tools such as Systrace and Stegdetect. He is a member of the Honeynet Project and an active contributor to open source projects. Provos is currently employed as senior staff engineer at Google, Inc.

Thorsten Holz is a Ph.D. student at the Laboratory for Dependable Distributed Systems at the University of Mannheim, Germany. He is one of the founders of the German Honeynet Project and a member of the Steering Committee of the Honeynet Research Alliance. His research interests include the practical aspects of secure systems, but he is also interested in more theoretical considerations of dependable systems. Currently, his work concentrates on bots/botnets, client honeypots, and malware in general. He regularly blogs at http://honeyblog.org.



(HTML tags aren't allowed.)

WebLogic Server 6.1 Workbook for Enterprise JavaBeans, 3rd Edition
WebLogic Server 6.1 Workbook for Enterprise JavaBeans, 3rd Edition

The WebLogic workbook is designed to be a companion guide for the book Enterprise Java Beans, 3rd Edition (O'Reilly) by Richard Monson-Haefel. It is published with the approval of O'Reilly & Associates and is produced by Richard Monson-Haefel.

The goal of this WebLogic-specific workbook, like the other vendor-specific...

ESR Spectroscopy in Membrane Biophysics (Biological Magnetic Resonance)
ESR Spectroscopy in Membrane Biophysics (Biological Magnetic Resonance)

Starting from a comprehensive quantum mechanical description, this book introduces the optical (IR, Raman, UV/Vis, CD, fluorescence and laser spectroscopy) and magnetic resonance (1D and 2D-NMR, ESR) techniques. The book offers a timely review of the increasing interest in using spin-label ESR as an alternative structural technique for NMR or...

Visual Basic 2005 Demystified
Visual Basic 2005 Demystified

There’s no easier, faster, or more practical way to learn the really tough subjects

Visual Basic 2005 Demystified fully explains the language and its libraries and applications. You’ll even learn to create a Visual Basic program without writing code. This self-teaching guide comes complete with key...


Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

An Introduction to Critical Discourse Analysis in Education
An Introduction to Critical Discourse Analysis in Education
This landmark text is the first introduction to concepts and issues in critical discourse analysis for educational researchers. The central premise is that critical discourse analysis must be conducted "systematically," which means conducting inquiry into the ways in which language form and function correlate with social practices....
Data Management, Analytics and Innovation: Proceedings of ICDMAI 2019, Volume 2 (Advances in Intelligent Systems and Computing)
Data Management, Analytics and Innovation: Proceedings of ICDMAI 2019, Volume 2 (Advances in Intelligent Systems and Computing)
This book presents the latest findings in the areas of data management and smart computing, big data management, artificial intelligence and data analytics, along with advances in network technologies. It addresses state-of-the-art topics and discusses challenges and solutions for future development. Gathering original, unpublished contributions...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy