نتایج جستجو برای: botnet

تعداد نتایج: 1363  

2011
Gregory Fedynyshyn Mooi Choo Chuah Gang Tan

Unlike other types of malware, botnets are characterized by their command and control (C&C) channels, through which a central authority, the botmaster, may use the infected computer to carry out malicious activities. Given the damage botnets are capable of causing, detection and mitigation of botnet threats are imperative. In this paper, we present a host-based method for detecting and differen...

2011
Arash Habibi Lashkari Seyedeh Ghazal Ghalebandi Mohammad Reza Moradhaseli

Botnets are security threat now days, since they tend to perform serious internet attacks in vast area through the compromised group of infected machines. The presence of command and control mechanism in botnet structure makes them stronger than traditional attacks. Over course of the time botnet developer have switched to more advanced mechanism to evade each of which new detection methods and...

2008
Kapil Singh Abhinav Srivastava Jonathon T. Giffin Wenke Lee

The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have .focused on filtering out malicious payloads and weblinksfrom email; the potential dangers of email go past these boundaries: harmless-looking emails can carry dangerous, hidden botnet content. In this paper, we evaluate the suitability ofemail communicationf...

2013
David Y. Wang Stefan Savage Geoffrey M. Voelker

Black hat search engine optimization (SEO) campaigns attract and monetize traffic using abusive schemes. Using a combination of Web site compromise, keyword stuffing and cloaking, a SEO botnet operator can manipulate search engine rankings for key search terms, ultimately directing users to sites promoting some kind of scam (e.g., fake antivirus). In this paper, we infiltrate an influential SEO...

Journal: :JCS 2017
Atef A. Obeidat Majd Al-kofahi Mohammad Jazi Bawaneh Essam Said Hanandeh

Corresponding Author: Atef Ahmed Obeidat Department of Information Technology, Al-Huson University College, Al-Balqa Applied University, Salt, Jordan Email: [email protected] Abstract: Botnets remain an active security problem on the Internet and various computer networks. They are continuously developing with regard to protocols, structure and quality of attacks. Many botnet detection programs ...

2011
Yong Qiao Yuexiang Yang Jie He Bo Liu Yingzhi Zeng

It’s increasingly difficult to detect botnets since the introduction of P2P communication. The flow characteristics and behaviors can be easily hidden if an attacker exploits the common P2P applications’ protocol to build the network and communicate. In this paper, we analyze two potential command and control mechanisms for Parasite P2P Botnet, we then identify the quasi periodical pattern of t...

2016
Joseph Desimone Daryl Johnson Bo Yuan Peter Lutz

Covert channels have the unique quality of masking evidence that a communication has ever occurred between two parties. For spies and terrorist cells, this quality can be the difference between life and death. However, even the detection of communications in a botnet could be troublesome for its creators. To evade detection and prevent insights into the size and members of a botnet, covert chan...

2015
Udaya Wijesinghe Udaya Kiran Tupakula Vijay Varadharajan

The botnet is a group of hijacked computers, which are employed under command and control mechanism administered by a botmaster. Botnet evolved from IRC based centralized botnet to employing common protocols such as HTTP with decentralized architectures and then peer-to-peer designs. As Botnets have become more sophisticated, the need for advanced techniques and research against botnets has gro...

Journal: :JNW 2011
Hailong Wang Jie Hou Zhenghu Gong

As technology has been developed rapidly, botnet threats to the global cyber community are also increasing. And the botnet detection has recently become a major research topic in the field of network security. Most of the current detection approaches work only on the evidence from single information source, which can not hold all the traces of botnet and hardly achieve high accuracy. In this pa...

Journal: :Nature Physics 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید