Like many companies, PocketBook uses cookie technology to enhance your user experience, for analytics and marketing purposes that are to show you relevant offers, tailored the best to your interests while running this website and third parties websites. PocketBook respects your privacy rights, thus we kindly ask you to take a moment to enjoy Managing Cookie Preferences. Please take a note that strictly necessary cookies are always enabled. If you are happy with the use of all cookie files, just click Accept all cookies. To learn more about cookie technology, its benefits and how Pocketbook use it, please go to our Cookie Notice.
You can change your cookie settings at any time, using your cookie settings. You can use this page through your account. For more information about cookies and how we use them, please see our cookie notice.
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.
Book series:SpringerBriefs on Cyber Security Systems and Networks