نتایج جستجو برای: botnet

تعداد نتایج: 1363  

2008
Sandeep Sarat

While the Internet has revolutionalized the communication landscape, it continues to be plagued by issues of robustness and security that threaten the network’s operation. In this dissertation, we employ a multi-faceted approach to tackle these issues. Specifically, measurement studies are performed to experimentally quantify the ground truth related to the robustness of the Internet infrastruc...

2010
Igor Kotenko Alexey Konovalov Andrey Shorov

Nowadays we are witnesses of the rapid spread of botnets across the Internet and using them for different cyber attacks against our systems. Botnets join a huge number of compromised computers in the Internet and allow using these computers for performing vulnerability scans, distributing denial-of-service (DDoS) attacks and sending enormous amounts of spam emails. It is a very complex task to ...

2012
S. S. Garasia D. P. Rana R. G. Mehta

Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyberattacks. A botnet is a group of compromised computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, spam, click fraud, identity theft and information phishing. The defining characteristic of botnets is the use of command an...

Journal: :Computer Networks 2013
Guanhua Yan

In order to evade detection of ever-improving defense techniques, modern botnet masters are constantly looking for new communication platforms for delivering C&C (Command and Control) information. Attracting their attention is the emergence of online social networks such as Twitter, as the information dissemination mechanism provided by these networks can naturally be exploited for spreading bo...

2012
Thomas Barabosch Andre Wichmann Felix Leder Elmar Gerhards-Padilla

Many botnets employ a method called domain fluxing for resilience. This technique strengthens the addressing layer of a botnet and allows a bot herder to dynamically provide command and control servers. For the calculation of new domains, a domain name generation algorithm (DGA) is used. In order to take actions against a domain fluxing botnet, the domain name generation algorithm has to be known.

2008
Daniel Ramsbrock Xinyuan Wang Xuxian Jiang

Despite the increasing botnet threat, research in the area of botmaster traceback is limited. The four main obstacles are 1) the low-traffic nature of the bot-to-botmaster link; 2) chains of “stepping stones;” 3) the use of encryption along these chains; and 4) mixing with traffic from other bots. Most existing traceback approaches can address one or two of these issues, but no single approach ...

2011
Julian Rrushi Ehsan Mokhtari Ali Ghorbani

The research that we discuss in this technical report shows that mathematical models of botnet propagation dynamics are a viable means of detecting early stage botnet infections in an enterprise network, and thus an effective tool for containing those botnet infections in a timely fashion. The main idea that underlies this research is to localize weakly connected subgraphs within a graph that m...

Journal: :International Journal of Computer Applications 2014

Journal: :International Journal of Computer Applications 2014

2013
Ashutosh Singh Annie H. Toderici Kevin Ross

A botnet is a group of compromised computers— often a large group—under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious threat on the Internet. This paper discusses SocialNetworkingBot, a botnet we have developed that...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید