Advertisement

Botnet Detection

Countering the Largest Security Threat

  • Wenke Lee
  • Cliff Wang
  • David Dagon

Part of the Advances in Information Security book series (ADIS, volume 36)

Table of contents

  1. Front Matter
    Pages I-XII
  2. W. Timothy Strayer, David Lapsely, Robert Walsh, Carl Livadas
    Pages 1-24
  3. Zhichun Li, Anup Goyal, Yan Chen
    Pages 25-44
  4. Elizabeth Stinson, John C. Mitchell
    Pages 45-64
  5. David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin
    Pages 65-88
  6. Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn
    Pages 89-116
  7. John Bambenek, Agnes Klus
    Pages 117-130
  8. Anirudh Ramachandran, Nick Feamster, David Dagon
    Pages 131-142
  9. David Dagon, Guofei Gu, Christopher P. Lee
    Pages 143-164
  10. Back Matter
    Pages 165-167

About this book

Introduction

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers.

Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science.

 

Keywords

ARO workshop Internet Wenke Lee botnet computer science detection techniques network research response strategy security strategy

Editors and affiliations

  • Wenke Lee
    • 1
  • Cliff Wang
    • 2
  • David Dagon
    • 3
  1. 1.Georgia Institute Technology College of ComputingAtlanta
  2. 2.US Army Research Office Computing and Information Science Div
  3. 3.Georgia Institute Technology College of ComputingAtlanta

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-68768-1
  • Copyright Information Springer Science+Business Media, LLC 2008
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-68766-7
  • Online ISBN 978-0-387-68768-1
  • Series Print ISSN 1568-2633
  • Buy this book on publisher's site