نتایج جستجو برای: botnet

تعداد نتایج: 1363  

Journal: :J. UCS 2016
Ahmad Karim Rosli Salleh Muhammad Khurram Khan Aisha Siddiqa Kim-Kwang Raymond Choo

Mobile botnet phenomenon is gaining popularity among malware writers in order to exploit vulnerabilities in smartphones. In particular, mobile botnets enable illegal access to a victim’s smartphone, can compromise critical user data and launch a DDoS attack through Command and Control (C&C). In this article, we propose a static analysis approach, DeDroid, to investigate botnet-specific properti...

2005
David Dagon Guofei Gu Cliff Zou Julian Grizzard Sanjeev Dwivedi Wenke Lee Richard Lipton

Attackers are increasingly using large networks of compromised machines to carry out further attacks (e.g., using botnets, or enormous groups of compromised hosts under the control of a single attacker). We consider the problem of responding to entire networks of attacking computers. We identify key metrics for measuring the utility of a botnet, and describe various topological structures they ...

2015

Botnets have become a major threat to the Internet as large armies of bot machines can be used to carry out a wide range of attacks. We present a botnet detection mechanism that uses two levels of support vector machines (SVMs) to identify infected bot machines before they are used in an attack. Our technique detects relationships in the networkflows dynamically and determines if such relations...

2013
Dusan Stevanovic

Application layer Distributed Denial of Service (DDoS) attacks are recognized as one of the most damaging attacks on the Internet security today. In our recent work [1], we have shown that unsupervised machine learning can be effectively utilized in the process of distinguishing between regular (human) and automated (web/botnet crawler) visitors to a web site. We have also shown that with a sli...

Journal: :CoRR 2016
Michel van Eeten Qasim Lone Giovane C. M. Moura Hadi Asghari Maciej Korczynski

Contents 1 Questions and methodology 6 1. 5 How do member ISPs compare among themselves? 47 6 Conclusions 55 6.

2012
Manos Antonakakis Roberto Perdisci Yacin Nadji Nikolaos Vasiloglou Saeed Abu-Nimeh Wenke Lee David Dagon

Many botnet detection systems employ a blacklist of known command and control (C&C) domains to detect bots and block their traffic. Similar to signature-based virus detection, such a botnet detection approach is static because the blacklist is updated only after running an external (and often manual) process of domain discovery. As a response, botmasters have begun employing domain generation a...

2007
Matthew Brand Adam Champion Derick Chan

Recently, the increase in “spam,” distributed denialof-service (DDoS) attacks, and other acts of online crime are facilitated by “botnets,” which are networks of compromised computer systems executing “bot” programs. In this paper, we precisely define the terms bot and botnet and explain their workings. We describe how miscreants have used and continue to use botnets to launch the aforementione...

2017
Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J. Alex Halderman Luca Invernizzi Michalis Kallitsis Deepak Kumar Chaz Lever Zane Ma Joshua Mason Damian Menscher Chad Seaman Nick Sullivan Kurt Thomas Yi Zhou

The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. By combining a variety of measurement ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید