The last botnet

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Combating the Botnet Scourge

Recently, the increase in “spam,” distributed denialof-service (DDoS) attacks, and other acts of online crime are facilitated by “botnets,” which are networks of compromised computer systems executing “bot” programs. In this paper, we precisely define the terms bot and botnet and explain their workings. We describe how miscreants have used and continue to use botnets to launch the aforementione...

متن کامل

Understanding the Mirai Botnet

The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. By combining a variety of measurement ...

متن کامل

Characterisation of the Kelihos.B Botnet

Botnets like Kelihos.B consist of infected computers that are used for malicious purposes. A large part of the Kelihos.B botnet was sinkholed and the bots in it send all their requests to controlled servers. All those requests are then stored in log files on the servers. These log files are used in this paper to find characteristics about this Kelihos.B botnet. Two types of analyses were conduc...

متن کامل

Botnet Tracking Tools

Botnets are a serious threat to internet security. Botnets consist of networked collections of compromised machines called robots or ‘bots’ for short. Bots are also called ‘zombies,’ and botnets are also called ‘zombie armies.’ Bots are controlled by nodes called ‘botmasters’ or ‘botherders.’ Bots are infected with malicious code that performs work on behalf of the botmaster or botherder. Botne...

متن کامل

Adaptability of IRC Botnet Detection Method to P2P Botnet Detection

This report mainly discusses the adaptability of the IRC-based Bot detection method to be used in the P2P-based Bot detection. The first section introduces the IRC-based bot and the newly appeared P2P-based bot to see their difference. The second section shows the related work and the traditional method of BOTNET detection. The third section discusses the methodology used by the IRC based Botne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature Physics

سال: 2008

ISSN: 1745-2473,1745-2481

DOI: 10.1038/nphys1067