BIT WARS: Cyber Crime, Hacking & Information Warfare (Volume 2)

Rating: 
Amazon Price: $5.50 $5.50 (as of August 22, 2017 16:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Do you hear news everyday on the latest hacking attack, but just don't quite understand what it is all about? Well this is the book for you. In BIT WARS, Dr. Thomas Hyslip presents the history of cybercrime, hacking and information warfare that has lead us to where we are today. Espionage, Stuxnet, Cyber Terrorism, Anonymous, TOR, the Deep Web, they are included. Hacking started as a quest for knowledge and curiosity, but has become a worldwide problem with no end in sight. The Center for Strategic and International Studies estimated the annual cost of cybercrime at more than $445 billion annually. Furthermore, the number and sophistication of attacks has steadily increased. In 2014, Target and Home Depot were victims of large scale point of sale attacks, and millions of credit and debit cards were stolen. Ebay lost the account information of over 233 million users, and Sony was attacked by North Korea in retaliation for the movie, “The Interview.” Read about it all in BIT WARS: Cyber Crime, Hacking and Information Warfare, and understand why you should be concerned.

Proactive Botnet Detection: Through Characterization of Distributed Denial of Service Attacks

Rating: 
Amazon Price: $5.90 $5.90 (as of August 22, 2017 22:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In this quantitative quasi-experimental study two distributed denial of service attacks were captured and the characteristics of the attacks were used to detect botnets by identifying egressing distributed denial of service attack packets at the source of the attack. A sample Dark DDoSer botnet was constructed and used to launch a distributed denial of service attack. The characteristics of the distributed denial of service attacks were used as the independent variables in a quasi-experiment where network traffic was monitored with Snort to detect DDoS packets. The dependent variable for the experiment was false positive alerts for the DDoS packets. The findings showed that the characteristics of a distributed denial of service attack can be used to pro-actively detect botnets through egress monitoring.