书目名称 | Vulnerability Analysis and Defense for the Internet | 编辑 | Abhishek Singh,Baibhav Singh,Hirosh Joseph | 视频video | | 概述 | Includes detail vulnerabilities in an application and how the vulnerability affects the software.Provides a source code for effective signatures to prevent vulnerabilities.Includes supplementary mater | 丛书名称 | Advances in Information Security | 图书封面 |  | 描述 | Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in vulnerability (see the news link on security focus http://www.securityfocus.com/brief/614). In January 2007, a vulnerable network resulted in a theft of 45.6 million credit card numbers in TJX companies due to unauthorized intrusion. A good protocol analysis and effective signature writing is one of the - fective method to prevent vulnerability and minimize the chances of intrusion in the network. However, protocol analysis poses two challenges namely false po- tive and evasion. If the signature to prevent the vulnerability is not written pr- erly, it will result in dropping of a valid traffic ther | 出版日期 | Book 2008 | 关键词 | Analysis; Code; Countermeasures; DHCP; Defense; Internet; SNMP; Singh; Vulnerability; security | 版次 | 1 | doi | https://doi.org/10.1007/978-0-387-74390-5 | isbn_softcover | 978-1-4419-4498-6 | isbn_ebook | 978-0-387-74390-5Series ISSN 1568-2633 Series E-ISSN 2512-2193 | issn_series | 1568-2633 | copyright | Springer-Verlag US 2008 |
The information of publication is updating
|
|