000 03626nam a22005657a 4500
001 sulb-eb0021680
003 BD-SySUS
005 20160413122155.0
007 cr nn 008mamaa
008 130703s2013 xxk| s |||| 0|eng d
020 _a9781447152163
_9978-1-4471-5216-3
024 7 _a10.1007/978-1-4471-5216-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aTiirmaa-Klaar, Heli.
_eauthor.
245 1 0 _aBotnets
_h[electronic resource] /
_cby Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini.
264 1 _aLondon :
_bSpringer London :
_bImprint: Springer,
_c2013.
300 _aVIII, 97 p. 5 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Cybersecurity,
_x2193-973X
505 0 _aForeword -- Botnets, Cybercrime and National Security -- Botnets: How to Fight the Ever-growing Threat on a Technical Level.
520 _aMalware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. Botnets provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts. The non-technical section addresses how botnet infrastructure could be exploited for national security and cybercrime purposes. It approaches the subject as a public policy issue and analyzes the phenomenon of botnets from national security, law enforcement and regulatory policy perspectives, and makes recommendations for policy-makers on different public policies, highlighting the need for international response mechanisms. The technical section provides insight into current botnet techniques and discusses state-of-the-art countermeasures to combat the botnet threat in detail. It includes new detection methods as well as different approaches to actively compromise running botnets.
650 0 _aComputer science.
650 0 _aComputer organization.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aComputers.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aComputer Systems Organization and Communication Networks.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems and Communication Service.
700 1 _aGassen, Jan.
_eauthor.
700 1 _aGerhards-Padilla, Elmar.
_eauthor.
700 1 _aMartini, Peter.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781447152156
830 0 _aSpringerBriefs in Cybersecurity,
_x2193-973X
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4471-5216-3
912 _aZDB-2-SCS
942 _2Dewey Decimal Classification
_ceBooks
999 _c43772
_d43772