Description |
1 online resource (xii, 82 pages) : illustrations |
Series |
SpringerBriefs on cyber security systems and networks, 2522-5561 |
|
SpringerBriefs on cyber security systems and networks.
|
Contents |
1 Honeypot Introductory -- 2 Honeypot -- 3 The Application of Honeypot -- 4 Detecting Honeypots and their Counter-measure -- 5 Ramsonware and Honeypot -- 6 Honeypot Frameworks -- 7 Conclusion and Future Work |
Summary |
This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems |
Bibliography |
Includes bibliographical references |
Notes |
Online resource; title from PDF title page (EBSCO, viewed May 15, 2018) |
Subject |
Computer security.
|
|
Malware (Computer software) -- Prevention
|
|
Computer Security
|
|
Computer networking & communications.
|
|
Computer security.
|
|
Mathematical physics.
|
|
Maths for computer scientists.
|
|
Computer modelling & simulation.
|
|
COMPUTERS -- Security -- General.
|
|
COMPUTERS -- Security -- Viruses & Malware.
|
|
Computer security
|
Form |
Electronic book
|
Author |
Pan, Lei, author.
|
|
Xiang, Yang (Computer scientist), author.
|
ISBN |
9789811077395 |
|
9811077398 |
|