Atjaunināt sīkdatņu piekrišanu

Botnets: Architectures, Countermeasures, and Challenges [Mīkstie vāki]

Edited by , Edited by (Institute for Infocomm Research, Infocomm Security (ICS) Department, Singapore), Edited by , Edited by
  • Formāts: Paperback / softback, 438 pages, height x width: 234x156 mm, weight: 553 g
  • Sērija : Series in Security, Privacy and Trust
  • Izdošanas datums: 29-Aug-2022
  • Izdevniecība: CRC Press
  • ISBN-10: 1032401133
  • ISBN-13: 9781032401133
  • Mīkstie vāki
  • Cena: 63,81 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 438 pages, height x width: 234x156 mm, weight: 553 g
  • Sērija : Series in Security, Privacy and Trust
  • Izdošanas datums: 29-Aug-2022
  • Izdevniecība: CRC Press
  • ISBN-10: 1032401133
  • ISBN-13: 9781032401133

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.



This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics

Preface vii
About the Editors ix
Contributors xi
1 Botnet Architectures: A State-of-the-Art Review
1(32)
Basheer Al-Duwair
Moath Jarrah
2 IoT Botnets: The Journey So Far and the Road Ahead
33(68)
Pascal Geenens
3 IoT Botnet Traits and Techniques: A View of the State of the Art
101(64)
Pascal Geenens
4 Advanced Information Hiding Techniques for Modern Botnets
165(24)
Luca Caviglione
Wojciech Mazurczyk
Steffen Wendzel
5 Steganography Techniques for Command and Control (C2) Channels
189(28)
Jedrzej Bientasz
Krzysztof Szczypiorski
6 Blockchain-Based Botnets for Command-and-Control Resilience
217(20)
Weizhi Wang
Xiaobo Ma
7 Detecting Botnets and Unknown Network Attacks in Big Traffic Data
237(32)
Luis Sacramento
Iberia Medeiros
Joao Bota
Miguel Correia
8 Domain Generation Algorithm Detection Techniques through Network Analysis and Machine Learning
269(24)
Federica Bisio
Salvatore Saeli
Danilo Massa
9 Identifying IoT-Based Botnets: A Microservice Architecture for IoT Management and Security
293(34)
Tharun Kammara
Melody Moh
10 Understanding and Detecting Social Botnet
327(32)
Yuede Ji
Qiang Li
11 Use of Botnets for Mining Cryptocurrencies
359(28)
Renlta Murimi
12 Time to Diverge the Botnet Revenues from Criminal Wallet?
387(16)
Giovanni Bottazzi
Gianluigi Me
Pierluigi Perrone
Giuseppe Giulio Rutigliano
Index 403
Dr. Marios Anagnostopoulos received his Ph.D. degree in information and

communication systems engineering from the Department of Information and

Communication Systems Engineering, University of the Aegean, Greece, in 2016.

The title of his doctoral thesis was DNS as a multipurpose attack vector.

Currently, he is Post-Doctoral Research Fellow in the Norwegian University of

Science and Technology (NTNU). Prior to joining NTNU, he worked as Post-

Doctoral Research Fellow in the Singapore University of Technology and Design

(SUTD). His research interests are in the fields of network security and privacy,

mobile and wireless networks security, cyber-physical security, and blockchain in

security and privacy.

Dr. Georgios Kambourakis received the Ph.D. degree in information and communication

systems engineering from the Department of Information and Communications

Systems Engineering, University of the Aegean, Greece, where he is

currently an associate professor, and the head of the department. His research

interests are in the fields of mobile and wireless networks security and privacy. He

has over 120 refereed publications in the aforementioned fields of study. For more

information, please visit http://www.icsd.aegean.gr/gkamb.

Dr. Weizhi Meng is currently an assistant professor in the Cyber Security Section,

Department of Applied Mathematics and Computer Science, Technical University

of Denmark (DTU), Denmark. He received his Ph.D. degree in computer science

from the City University of Hong Kong (CityU), China. Prior to joining DTU, he

worked as a research scientist in Institute for Infocomm Research, A*Star, Singapore,

and as a senior research associate in CS Department, CityU. He won the Outstanding

Academic Performance Award during his doctoral study and is a recipient of

the Hong Kong Institution of Engineers (HKIE) Outstanding Paper Award for

Young Engineers/Researchers in both 2014 and 2017. He is also a recipient of Best

Paper Award from ISPEC 2018 and Best Student Paper Award from NSS 2016. His

primary research interests are cyber security and intelligent technology in security,

including intrusion detection, smartphone security, biometric authentication, HCI

security, trust management, blockchain in security, and malware analysis.

Dr. Peng Zhou is currently an associate professor at Shanghai University. He has

received his Ph.D. degree from the Hong Kong Polytechnic University and

worked as a research fellow in Singapore Nanyang Technological University for

one year. His research interests include network security, computer worms and

propagation, and machine learning.