ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings (Lecture Notes in Computer Science, 4579)

دانلود کتاب تشخیص نفوذ و بدافزار، و ارزیابی آسیب پذیری: چهارمین کنفرانس بین المللی، DIMVA 2007 لوسرن، سوئیس، 12-13 جولای، 2007 مجموعه مقالات (یادداشت های سخنرانی در علوم کامپیوتر، 4579)

Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings (Lecture Notes in Computer Science, 4579)

مشخصات کتاب

Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings (Lecture Notes in Computer Science, 4579)

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 3540736131, 9783540736134 
ناشر: Springer 
سال نشر: 2007 
تعداد صفحات: 260 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 7 مگابایت 

قیمت کتاب (تومان) : 43,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 1


در صورت تبدیل فایل کتاب Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings (Lecture Notes in Computer Science, 4579) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تشخیص نفوذ و بدافزار، و ارزیابی آسیب پذیری: چهارمین کنفرانس بین المللی، DIMVA 2007 لوسرن، سوئیس، 12-13 جولای، 2007 مجموعه مقالات (یادداشت های سخنرانی در علوم کامپیوتر، 4579) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Title Page
Preface
Organization
Table of Contents
Extensible Web Browser Security
	Introduction
	Related Work
	A Malware Extension
	Our Approach to Enhance Security
		Extension Installation and Loading
		Install Protection Experimental Analysis
	Extension Execution
	Conclusion
	References
On the Effectiveness of Techniques to Detect Phishing Sites
	Introduction
	Related Work
	Scope of Study
	Experimental Setup
		Anti-phishing Solutions
		Test Data
	Study of Blacklist Effectiveness
	Study of Page Analysis Effectiveness
		Page Properties
		Classification Model
		Analysis of Internet Explorer Heuristics
	Conclusion
	References
Protecting the Intranet Against “JavaScript Malware” and Related Attacks
	Introduction
		Definitions
		Transparent Implicit Authentication
		Cross Site Request Forgery
	Attacking the Intranet with JavaScript
		Using a Webpage to Get Access to Restricted Web Resources
		A Closer Look at JavaScript
		Portscanning the Intranet
		Fingerprinting of Intranet Hosts
		Attacking Intranet Servers
		Leaking Intranet Content by Breaking DNS-Pinning
		Attacks That Do Not Rely on JavaScript
		Analysis
	Defense Strategies
		Turning Off Active Client-Side Technologies
		Extending the SOP to Single Elements
		Rerouting Cross-Site Requests
		Restricting the Local Network
		Comparison of the Proposed Protection Approaches
	Evaluation
		Implementation
		Practical Evaluation
		Limitations
	Related Work
	Conclusion and Future Work
	References
On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements
	Introduction
	Related Work
	The Test Scenario: Web Site Defacement Detection
		Motivation and Framework
		Prototype Details
	Experiments
		Dataset
		Methodology
	Results
		Uncorrupted Learning Sequence
		Corrupted Learning Sequence
	A Corruption Detection Procedure
		Description
		Evaluation and Results
	Concluding Remarks
	References
Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3
	Introduction
	Background - Reasoning About Behaviors
	The TTCN Language
	Motivation and Aims
	Case Study - Detecting $Smurf$ with TTCN-3
	Issues and Improvements
	Conclusions and Further Work
	References
Characterizing Bots’ Remote Control Behavior
	Introduction
	BotsandBotnets
		Bot Families and Variants
		Bot Capabilities and Commands
	Experimental Method
	Implementation
		Library and System Call Interposition
		Tainting Module
		User Input Module
		Behavior-Check Procedure
	Experimental Evaluation
		Bot Experiment Setup
		Terminology
		Bot Results
		Benign Program Results
		Performance Results
	Potential for Host-Based, Behavioral Bot Detection
	Related Work
	Conclusions
	References
Measurement and Analysis of Autonomous Spreading Malware in a University Environment
	Introduction
	Related Work
	Measurement Setup
	Analysis of Autonomous Spreading Malware
		Network-Based Analysis Results
		CWSandbox Analysis Results
		Antivirus Engines Detection Rates
		Botspy Analysis Results
	Conclusion and Future Work
	References
Passive Monitoring of DNS Anomalies
	Introduction
	Related Work
	Data Capture Methodology
	Results
		Collected Data
		Resource Record Type Prevalence
		Impact of Anti-spam Tools on the DNS System
		Typo Squatter Domains
		Fast Flux Domains
		Anomalous Records
		Record Reputation
	Conclusion and Future Work
	References
Characterizing Dark DNS Behavior
	Introduction
	Domain Name System
	Related Work
	Methodology
	DataAnalysis
		Basic Statistics
		Query Rate
		Query Targets
		Query Sources
	Discussion
		PTR Reconnaissance
		Validating Usefulness of PTR Reconnaissance
		Honeydns to Combat PTR Reconnaissance
	Conclusions and Future Work
	References
Distributed Evasive Scan Techniques and Countermeasures
	Introduction
	Classification of Scan Detection Methods and Evaluation Metrics
		Classification of Scan DetectionMethods
		EvaluationMetrics for Scan DetectionMethods
	z-Scan: Evasion Attacks Against TRW
		Naive Scan Against TRW
		z-Scan Against TRW
	Hybrid Detection Method and Evaluation
		Delayed Scan Against BSD
		Hybrid DetectionMethod
	Information-Hiding Countermeasures Against Evasion Techniques
	Related Work
	Conclusion
	References
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms
	Introduction
	Related Work
	DataAnalysis
		Time Interval to Visit New Destinations
	RBS: Rate-Based Sequential Hypothesis Testing
	Evaluation
	Hybrid Approach: RBS+TRW
	Discussion
	Conclusion
	References
Targeting Physically Addressable Memory
	Introduction
		Roadmap
	Physically Addressable Memory Sources: libphysical
		Swapping, Multiple Accessors, Caching, Address Translation
		IEEE1394
		Filedescriptor: /dev/mem, Memory Dumps
		Other Sources
	Translating Virtual to Physical Addresses
		Example Implementation: IA-32 Backend for liblinear
		Finding Address Translation Tables
		Matching Via Statistics: NCD (Normalized Compression Distance)
	Attacking
		Information Gathering
		Userspace Modifications
	Future Prospects
		Kernelspace Modifications
		Bootstrapping Custom Operating Systems
	Conclusion
	References
Static Analysis on x86 Executables for PreventingAutomatic Mimicry Attacks
	Introduction
	Related Works
	Preliminaries
	Defeating Automatic Mimicry Attacks
		Defensive Strategy
	Effectiveness
		GOT Protection
		Code Pointers Protection
	Technical Details
		Static Analysis Tools
		Process Instrumentation
		int3 Exception Handling
	Experimental Results
	Conclusion and Future Works
	References
A Study of Malcode-Bearing Documents
	Introduction
	Background and Related Work
		Binary Content File Analysis
		Steganalysis
		Polymorphic Code Generation Tools
		Dynamic Sandbox Tests
	Statistical Analysis
		The POI Parser and SPARSEGui
		Statistical Content-Based Detection
		Performance Evaluation
		File Content Differences Identify Embedded Malcode
	Dynamic Run-Time Tests Using Environment Diversity
		Test 1 – OS Crashes
		Test 2 – Unexpected Changes to the Underlying Environment
		Test 3 – Non-fatal Application Errors
		Experiments and Analysis
	Conclusion
	References
Author Index




نظرات کاربران