Description
Elsevier BotnetsThe Killer Web App 2008 Edition by Schiller
Key Features This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourselfDescription The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.Readership Information security officers, network administrators, system administrators, incident response teams, security researchers, law enforcement, and security/network software developers are the primary audience for this book. The secondary audience includes CIOs and IT managers and directors who are being questioned by board members and executives about this new threat.Author Information By Craig Schiller , CISO for Portland State University and President of Hawkeye Security Training, LLC; and Jim Binkley , Teacher, network engineer, and researcher, Portland State University, USATable of ContentsBotnets: A Call to Action Botnets Overview Alternative Botnet C&Cs Common Botnets Botnet Detection: Tools and Techniques Ourmon: Overview and Installation Ourmon: Anomaly Detection Tools IRC and Botnets Advanced Ourmon Techniques Using Sandbox Tools for Botnets Intelligence Resources Responding to Botnets