نتایج جستجو برای: botnet lifecycle

تعداد نتایج: 26397  

Journal: :Mechanical Engineering 2013

Journal: :Journal of Marine Science and Engineering 2020

2011
Brett Stone-Gross Thorsten Holz Gianluca Stringhini Giovanni Vigna

Spam accounts for a large portion of the email exchange on the Internet. In addition to being a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many criminal scams and large-scale compromises. Most of this spam is sent using botnets, which are often rented for a fee to criminal organizations. Even though there has been a considerable corpus of research focused...

Journal: :ICST Trans. Security Safety 2015
Kai Chen Jun Shao

An introduction to the key topics and challenges in Botnet, buffer overflow vulnerability, privacy-preserving and others.

2009
Felix LEDER Peter MARTINI

Botnets, consisting of thousands of interconnected, remote-controlled computers, pose a big threat against the Internet. We have witnessed the involvement of such malicious infrastructures in politically motivated attacks more than once in recent years. Classical countermeasures are mostly reactive and conducted as part of incident response actions. This is often not sufficient. We argue that p...

2012
Zaheeruddin Shambhu Kumar

ABSTRACT : With the rapid development of information technology, internet has affect the people in all aspects such as public utilities, telecommunication, financial transaction and defense system, all depends on information technology and their security. The widespread deployment of new technologies had maximized the use of internet to a great extent. But at the same time, the potential attack...

2010
Ping Wang Baber Aslam Cliff Changchun Zou

“Botnet” is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without C&C servers, P2P botnets are more resilient to defense...

2011
Hisashi Tsuruta Takayoshi Shoudai Jun’ichi Takeuchi

To early detect and defend the threats in the Internet caused by botnet, darknet monitoring is very important to understand various botnet activities. However, common illegal accesses by ordinary malwares makes such detection difficult. In this paper, in order to remove such accesses by ordinary malwares from the results of network monitoring, we propose a data screening method based on finding...

2009
Ping Wang Baber Aslam Cliff C. Zou

“Botnet” is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without C&C servers, P2P botnets are more resilient to defense...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید