نتایج جستجو برای: botnet lifecycle

تعداد نتایج: 26397  

2012
Thomas Barabosch Andre Wichmann Felix Leder Elmar Gerhards-Padilla

Many botnets employ a method called domain fluxing for resilience. This technique strengthens the addressing layer of a botnet and allows a bot herder to dynamically provide command and control servers. For the calculation of new domains, a domain name generation algorithm (DGA) is used. In order to take actions against a domain fluxing botnet, the domain name generation algorithm has to be known.

2008
Daniel Ramsbrock Xinyuan Wang Xuxian Jiang

Despite the increasing botnet threat, research in the area of botmaster traceback is limited. The four main obstacles are 1) the low-traffic nature of the bot-to-botmaster link; 2) chains of “stepping stones;” 3) the use of encryption along these chains; and 4) mixing with traffic from other bots. Most existing traceback approaches can address one or two of these issues, but no single approach ...

2011
Julian Rrushi Ehsan Mokhtari Ali Ghorbani

The research that we discuss in this technical report shows that mathematical models of botnet propagation dynamics are a viable means of detecting early stage botnet infections in an enterprise network, and thus an effective tool for containing those botnet infections in a timely fashion. The main idea that underlies this research is to localize weakly connected subgraphs within a graph that m...

Journal: :International Journal of Computer Applications 2014

Journal: :International Journal of Computer Applications 2014

2013
Ashutosh Singh Annie H. Toderici Kevin Ross

A botnet is a group of compromised computers— often a large group—under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious threat on the Internet. This paper discusses SocialNetworkingBot, a botnet we have developed that...

2011
Craig Valli

This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures that will avoid detection by AV software and hinder analysis. The botnet can then use the customized malware to target an organization with an...

2011
Seungwon Shin Raymond Lin Guofei Gu

In this paper, we analyze a large amount of infection data for three major botnets: Conficker, MegaD, and Srizbi. These botnets represent two distinct types of botnets in terms of the methods they use to recruit new victims. We propose the use of cross-analysis between these different types of botnets as well as between botnets of the same type in order to gain insights into the nature of their...

Journal: :BMJ 1987

ژورنال: حسابداری مالی 2019

According to the importance and the increasing trend of idiosyncratic volatility in recent years, the study of factors affecting idiosyncratic volatility is one of the important issues in financial markets. So, the purpose of this study is to investigate the relationship between lifecycle and idiosyncratic volatility with emphasis on fundamental and information uncertainty. In this regard, 152 ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید