نتایج جستجو برای: botnet detection
تعداد نتایج: 566813 فیلتر نتایج به سال:
BotNets are major threat of the current Internet. It is widespread malware and it arises commonly in today‟s cyber crime, which results in serious threats to our network. The compromised computer is infected by viruses, worms, or it has become a target of network attacks only when operational state of a network component is shifted from normal state to abnormal state. Thus, prevention and detec...
Botnets pose a severe threat to the security of Internet-connected hosts and the availability of the Internet's infrastructure. In recent years, botnets have attracted many researchers. As a result, many achievements in studying different botnets' anatomies have been made and approaches to botnet detection have been developed. However, most of these approaches target at botnet detection using r...
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have .focused on filtering out malicious payloads and weblinksfrom email; the potential dangers of email go past these boundaries: harmless-looking emails can carry dangerous, hidden botnet content. In this paper, we evaluate the suitability ofemail communicationf...
The research objective of this project is to investigate one possible advanced botnet – honeypotaware peer-to-peer (P2P) botnet: verifying our analysis of the propagation of a honeypot-aware P2P botnet, and then showing the feasibility of developing a such botnet in terms of its propagation effectiveness. A “botnet” is a network composed of compromised computers (“bots”) on the Internet, that a...
Cyber-criminals can distribute malware to control computers on a networked system and leverage these compromised computers to perform their malicious activities inside the network. Botnet-detection mechanisms, based on a detailed analysis of network traffic characteristics, provide a basis for defense against botnet attacks. We formulate the botnet defense problem as a zero-sum Stackelberg secu...
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of the current botnet detection approaches work only on specific botnet command and control (C&C) protocols (e.g., IRC) and structures (e.g., centralized), and can become ineffective as botnets change their C&C techniques. In this paper, we present a...
BotNet is a type of malware that has posed serious threats to Internet community and has been a common weapon for committing cybercrimes such as spam generation, stealing sensitive information, click fraud and DDOS attacks. In this document, we propose an approach for BotNet detection at large scale where network traffic is monitored at a central core in the Internet (say a Tier-1 ISP) so that ...
A botnet, which is a group of compromised and remotelycontrolled computers (also called bots), poses a serious threat to the Internet. The commonly-used command and control (C&C) channel for a botnet is used by a central server, such as IRC or HTTP. Recently, Storm botnet, a P2Pbased botnet with a decentralized C&C channel has appeared in the wild. In this paper, we propose a distributed approa...
P2P botnet is one of the most critical threats to the current Internet security. In this paper, we propose a session-based analysis and minimum vertex cover mining detecting model for core nodes of P2P botnets. This model is focused on solving the core nodes of botnet and has a good performance when the characteristics of botnet are changed to avoid detecting. The simulation experiments reveal ...
Botnets have become one of the major attacks in current Internet due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defense systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviors, they are widely used by security d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید