Welcome to Cheap2Price

    Honeypots and Routers Collecting Internet Attacks

    Product Descriptions:

    • Product Name: Honeypots and Routers Collecting Internet Attacks
    • Publisher ‏ : ‎ Auerbach Publications; 1st edition (December 2, 2015)
    • Publication date ‏ : ‎ December 2, 2015
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 9348 KB
    • Simultaneous device usage ‏ : ‎ Up to 4 simultaneous devices, per publisher limits
    • Text-to-Speech ‏ : ‎ Not enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Print length ‏ : ‎ 198 pages
    • Lending ‏ : ‎ Not Enabled

    Book Description:

    Honeypots and Routers Collecting Internet Attacks 1st Edition, Kindle Edition:

    As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment.

    Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security:

      • Computer networks: technologies, routing protocols, and Internet architecture
      • Information and network security: concepts, challenges, and mechanisms
      • System vulnerability levels: network, operating system, and applications.

    The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it.

    The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.


    Table of Contents:

    Computer Networks. Information System Security. Intrusions and Vulnerabilities. Malware. Honeypots. Security Systems. Zero-Day Polymorphic Worms Collection Method.



    Mohssen Mohammed received his B.Sc. (Honors) degree in Computer Science from Computer Man College for Computer Studies (Future University), Khartoum, Sudan, in 2003. In 2006, he received his M.Sc. degree in Computer Science from the Faculty of Mathematical Sciences, University of Khartoum, Sudan. In 2012, he received his PhD in Electrical Engineering from Cape Town University, South Africa. He has published several papers at top international conferences such as GLOBECOM and MILCOM. He has served as a Technical Program Committee member in numerous international conferences, such as ICSEA 2010 and ICNS 2011. He received the University of Cape Town prize for International Scholarship for Academic Merit (2007, 2008, and 2009). From 2005 to 2012, he worked as a permanent academic staff member at the University of Juba, South of Sudan. He is now working as Assistant Professor in the College of Computer Science & Information Technology, Bahri University, Khartoum, Sudan. His research interest includes network security, especially intrusion detection and prevention systems, honeypots, firewalls, and malware detection methods.

    Habib-ur Rehman completed his doctoral studies in 2009 at the Technische Universitaet Carolo Wilhelmina zu Braunschweig, Germany. Earlier, he obtained his MS degree in 2004 from the Lahore University of Management Sciences, Lahore, Pakistan. He worked as an Assistant Professor at the National Textile University, Faisalabad, Pakistan, and National University of Computer and Emerging Sciences, Islamabad, Pakistan. Since early 2012, he has been teaching at the Al-Imam Muhammad Ibn Saud Islamic University, Riyadh, KSA. His primary research interests are the design and development of network protocols, schemes, and models for mobile and ad hoc networks. He has focused on the issues of routing, MAC, streaming, security, and information sharing in his research. He has also supervised undergrad students in the development of useful Android applications.


    There are no reviews yet.

    Only logged in customers who have purchased this product may leave a review.

    Vendor Information

    • Sale!
      Rated 0 out of 5

      CEH v9 Certified Ethical Hacker Version 9


      Product details:

      Product Format: PDF Format
      Development Editor: Kim Wimpsett
      Technical Editors: Raymond Blockmon, Jason McDowell, Tom Updegrove
      Production Editor: Rebecca Anderson
      Copy Editor: Linda Recktenwald
      Editorial Manager: Mary Beth Wakefield
      Production Manager: Kathleen Wisor
      Executive Editor: Jim Minatel
      Media Supervising Producer: Rich Graves
      Book Designers: Judy Fung and Bill Gibson
      Proofreader: Nancy Carrasco
      Indexer: J & J Indexing
      Project Coordinator, Cover: Brent Savage
      Cover Designer: Wiley
      Cover Image: ©Getty Images Inc./Jeremy Woodhouse
      Copyright © 2016 by John Wiley & Sons, Inc., Indianapolis, Indiana
      Publisher ‏ : simultaneously in Canada; 3rd edition (May 2, 2016)
      Language ‏ : English
      Paperback ‏ : ‎ 761 pages
      ISBN: 978-1-119-25224-5
      ISBN: 978-1-119-25227-6 (ebk.)
      ISBN: 978-1-119-25225-2 (ebk.)
      Item Weight ‏ : ‎ 2.39 pounds
      Dimensions ‏ : ‎ 7.3 x 1.4 x 9.1 inches
      Add to cart
    • Sale! Ten Fit Jewelry 3 Carat VVS1 Simulated Diamond Engagement Ring for Women Silver Wedding Jewelry
      Rated 0 out of 5

      Ten Fit Jewelry 3 Carat VVS1 Simulated Diamond Engagement Ring for Women Silver Wedding Jewelry


      Product specifications

      Jewelry Information:

      Brand, Seller, or Collection Name Ten Fit
      Metal stamp 0.925
      Metal Platinum-plated
      Material gemstone
      Gem Type Created Diamond
      Setting Prong
      Length 5 millimeters
      Ring size 4.5
      Resizable No
      Model number R106-4.5

      Created Diamond Information:

      Stone shape Square
      Minimum color clear
      Cut 3 ex Antwerp Cut
      Stone Creation Method Simulated
      Add to cart
    • Sale!
      Rated 0 out of 5

      Vollare Macadamia Oil Concentrated Hair Serum For Colored Hair – 30ml


      Our Vollare Macadamia Oil Concentrated Hair Serum for colored hair perfectly underlines their tone and brings out the natural glow. Our iconic product is concentrated power of oils, mainly macadamia, strengthening weakened scalp and prevents hair loss by removing excess sebum and other impurities, and tightens enlarged hair follicles for stronger, healthier hair.

      Add to cart
    • Sale!
      Rated 0 out of 5

      Hackers Beware


      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Sams; 1st edition (August 1, 2001)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 817 pages

      Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested “in how they do that” – the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.

      Add to cart
    • Rated 0 out of 5

      Phasellus varius turpis


      Phasellus varius turpis consequat enim tincidunt, id aliquam orci hendrerit. Curabitur quis accumsan nisl, in condimentum magna. Fusce nec diam et dolor ornare rhoncus nec ut mauris. In eleifend mi in felis dictum fermentum. Morbi vel arcu sit amet dolor venenatis bibendum in eu dui.

      Add to cart
    Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
    • Image
    • SKU
    • Rating
    • Price
    • Stock
    • Availability
    • Add to cart
    • Description
    • Content
    • Weight
    • Dimensions
    • Additional information
    • Attributes
    • Custom attributes
    • Custom fields
    Click outside to hide the compare bar
    Wishlist 0
    Open wishlist page Continue shopping