schliessen

Filtern

 

Bibliotheken

Content agnostic malware detection in networks / vorgelegt von Florian Tegeler

Bots are the root cause of many security problems on the Internet - they send spam, steal information from infected machines, and perform distributed denial of service attacks. Given their security impact, it is not surprising that a large number of techniques have been proposed that aim to detect a... Full description

PPN (Catalogue-ID): 722229186
Personen: Tegeler, Florian
Format: eBook eBook
Language: English
Sprache der Zusammenfassung: Englisch
Published: 2012
Hochschule: Göttingen, Univ., Diss., 2012
Basisklassifikation: 54.38
Formangabe: Hochschulschrift
Physical Description: Online-Ressource (PDF-Datei: 138 S., 1.500 KB), Ill., graph. Darst.

Similar Items

Vorhandene Hefte/Bände

more (+)

Informationen zur Verfügbarkeit werden geladen

Staff View
LEADER 06323cam a2201357 4500
001 722229186
003 DE-627
005 20190310000507.0
007 cr uuu---uuuuu
008 120824s2012 xx |||||om 00| ||eng c
015 |a 13,O12  |2 dnb 
016 7 |a 1044046813  |2 DE-101 
024 7 |a urn:nbn:de:gbv:7-webdoc-3592-1  |2 urn 
035 |a (DE-627)722229186 
035 |a (DE-576)9722229184 
035 |a (DE-599)GBV722229186 
035 |a (OCoLC)863903249 
035 |a (DE-101)1044046813 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE-NI 
082 0 |a 610  |2 23sdnb 
082 0 |a 004  |2 23sdnb 
082 0 4 |a 610  |q DNB 
084 |a 54.38  |2 bkl 
100 1 |a Tegeler, Florian 
245 1 0 |a Content agnostic malware detection in networks  |c vorgelegt von Florian Tegeler 
264 1 |c 2012 
300 |a Online-Ressource (PDF-Datei: 138 S., 1.500 KB)  |b Ill., graph. Darst 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
502 |a Göttingen, Univ., Diss., 2012 
520 |a Bots are the root cause of many security problems on the Internet - they send spam, steal information from infected machines, and perform distributed denial of service attacks. Given their security impact, it is not surprising that a large number of techniques have been proposed that aim to detect and mitigate bots, both network-based and host-based approaches. Detecting bots at the network-level has a number of advantages over host based solutions, as it allows for the efficient analysis of a large number of hosts without the need for any end point installation. Currently, network-based botnet detection techniques often target the command and control traffic between the bots and their botmaster. Moreover, a significant majority of these techniques are based on the analysis of packet payloads. The proposed approaches range from simple pattern matching against signatures to structural analysis of command and control communication. Unfortunately, deep packet inspection is rendered increasingly ineffective as malware authors start to use obfuscated or encrypted command and control connections ... 
546 |a Sprache der Zusammenfassung: Englisch 
583 1 |z Langzeitarchivierung gewährleistet  |2 pdager 
655 7 |a Hochschulschrift  |0 (DE-588)4113937-9  |0 (DE-627)105825778  |0 (DE-576)209480580  |2 gnd-content 
751 |a Göttingen  |4 uvp 
776 0 8 |i Druckausg.  |a Tegeler, Florian  |t Content agnostic malware detection in networks  |d 2012  |h xx, 116 S.  |w (DE-627)722228899 
856 4 0 |u http://resolver.sub.uni-goettingen.de/purl/?webdoc-3592  |q text/html  |z Kostenfrei 
856 4 0 |u http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1  |q text/html  |z Kostenfrei 
856 4 0 |u http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1  |v 2013-12-04  |x Resolving-System  |3 Volltext 
856 4 0 |u http://d-nb.info/1044046813/34  |v 2013-12-04  |x Langzeitarchivierung Nationalbibliothek  |3 Volltext 
856 7 |u urn:nbn:de:gbv:7-webdoc-3592-1  |2 urn 
912 |a GBV-ODiss 
912 |a GBV_ILN_20 
912 |a SYSFLAG_1 
912 |a GBV_KXP 
912 |a GBV-ODiss 
912 |a GBV_ILN_21 
912 |a GBV-ODiss 
912 |a GBV_ILN_22 
912 |a GBV-ODiss 
912 |a GBV_ILN_23 
912 |a GBV-ODiss 
912 |a GBV_ILN_30 
912 |a GBV-ODiss 
912 |a GBV_ILN_40 
912 |a GBV-ODiss 
912 |a GBV_ILN_60 
912 |a GBV-ODiss 
912 |a GBV_ILN_63 
912 |a GBV-ODiss 
912 |a GBV_ILN_70 
912 |a GBV-ODiss 
912 |a GBV_ILN_105 
912 |a GBV-ODiss 
912 |a GBV_ILN_132 
912 |a GBV-ODiss 
912 |a GBV_ILN_213 
912 |a GBV-ODiss 
912 |a GBV_ILN_230 
912 |a GBV-ODiss 
912 |a GBV_ILN_2403 
936 b k |a 54.38  |j Computersicherheit  |0 (DE-627)106418866 
951 |a BO 
980 |2 20  |1 01  |b 1461950597  |x 0084  |y x  |z 08-03-14 
980 |2 21  |1 01  |b 1462016405  |x 0046  |y z  |z 08-03-14 
980 |2 22  |1 01  |b 146208205X  |h SUBolrd  |x 0018  |y xu  |z 08-03-14 
980 |2 23  |1 01  |b 178769402X  |h olr-d  |x 0830  |y x  |z 26-07-18 
980 |2 30  |1 01  |b 1787773310  |x 0104  |y z  |z 26-07-18 
980 |2 40  |1 01  |b 1321767218  |h 03.07.2012 10:21:25  |x 0007  |y ksn  |z 24-08-12 
980 |2 60  |1 01  |b 1462247164  |h OLRD  |x 0705  |y z  |z 08-03-14 
980 |2 63  |1 01  |b 1787877027  |h ORD  |x 3401  |y x  |z 26-07-18 
980 |2 70  |1 01  |b 1787922219  |x 0089  |y zdt  |z 26-07-18 
980 |2 105  |1 01  |b 1596210400  |x 0841  |y z  |z 21-01-16 
980 |2 132  |1 01  |b 1498396798  |h OLR-DISS  |x 0959  |y x  |z 14-08-14 
980 |2 213  |1 01  |b 1462382525  |h ORD  |x 0551  |y x  |z 08-03-14 
980 |2 230  |1 01  |b 1462435459  |h ORD  |x 0552  |y x  |z 08-03-14 
980 |2 2403  |1 01  |b 349487283X  |e n  |x 21403  |y l01  |z 18-07-19 
981 |2 20  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 21  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 22  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 23  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 30  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 40  |1 01  |y LF  |r http://resolver.sub.uni-goettingen.de/purl/?webdoc-3592 
981 |2 40  |1 01  |y LF  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 60  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 70  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 105  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 132  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 213  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 230  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
981 |2 2403  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3592-1 
983 |2 40  |1 00  |8 00  |0 (DE-601)620137339  |a AH 000  |b General Literature {Computing} 
983 |2 60  |1 01  |8 10  |a ho 
985 |2 20  |1 01  |a OLRD 
995 |2 22  |1 01  |a SUBolrd 
995 |2 23  |1 01  |a olr-d 
995 |2 40  |1 01  |a 03.07.2012 10:21:25 
995 |2 60  |1 01  |a OLRD 
995 |2 63  |1 01  |a ORD 
995 |2 132  |1 01  |a OLR-DISS 
995 |2 213  |1 01  |a ORD 
995 |2 230  |1 01  |a ORD 
998 |2 23  |1 01  |0 2018-07-26:10:53:10