0
Virtual Honeypots 1ED (P) : From botnet tracking to intrusion detection
ผู้เขียน Thorsten Holz, Niels Provos
หนังสือ1,710.00 บาท
เนื้อหาโดยสังเขป

    Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain.
    In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you’ll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you’ve never deployed a honeypot before.
    You’ll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation.

    After reading this book, you will be able to
    - Compare high-interaction honeypots that provide real systems and services and the low-interaction honeypots that emulate them
    - Install and configure Honeyd to simulate multiple operating systems, services, and network environments -Use virtual honeypots to capture worms, bots, and other malware
    - Create high-performance "hybrid" honeypots that draw on technologies from both low- and high-interaction honeypots
    - Implement client honeypots that actively seek out dangerous Internet locations
    - Understand how attackers identify and circumvent honeypots
    - Analyze the botnets your honeypot identifies, and the malware it captures
    - Preview the future evolution of both virtual and physical honeypots

สารบัญ

1. Honeypot and Networking Background
2. High-Interaction Honeypots
3. Low-Interaction Honeypots
4. Honeyd-The Basics
5. Honeyd-Advanced Topics
6. Collecting Malware with Honeypots
7. Hybrid Systems
8. Client Honeypots
9. Detecting Honeypots
10. Case Studies
11. Tracking Botnets
12. Analyzing Malware with CWSandbox

คำนิยม
"This is one of the must-read security books of the year."Cyrus Peikari, CEO, Airscanner Mobile Security, author, security warrior
"This book clearly ranks as one of the most authoritative in the field of honeypots. It is comprehensive and well written. The authors provide us with an insider's look at virtual honeypots and even helps us in setting up and understanding an otherwise very complex technology."Stefan Kelm, Secorvo Security Consulting
รายละเอียดหนังสือ
ISBN: 0321336321 (ปกอ่อน) 440 หน้า
ขนาด: 177 x 233 x 20 มม.
น้ำหนัก: 690 กรัม
เนื้อในพิมพ์: ขาวดำ
ชนิดกระดาษ: กระดาษปอนด์
สำนักพิมพ์Addison-Wesley Publishing Company, Inc.
เดือนปีที่พิมพ์: 2007
สินค้าที่ลูกค้ามักซื้อด้วยกัน