نتایج جستجو برای: botnet lifecycle

تعداد نتایج: 26397  

2012
Sebastian Abt Harald Baier

Botnets pose a severe threat to the security of Internet-connected hosts and the availability of the Internet's infrastructure. In recent years, botnets have attracted many researchers. As a result, many achievements in studying different botnets' anatomies have been made and approaches to botnet detection have been developed. However, most of these approaches target at botnet detection using r...

Journal: :IJICS 2010
Ping Wang Lei Wu Ryan Cunningham Cliff Changchun Zou

Botnets have become one of the major attacks in current Internet due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defense systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviors, they are widely used by security d...

2008
Mohammad M. Masud Jing Gao Latifur Khan Jiawei Han Bhavani Thuraisingham

We propose a novel stream data classification technique to detect Peer to Peer botnet. Botnet traffic can be considered as stream data having two important properties: infinite length and drifting concept. Thus, stream data classification technique is more appealing to botnet detection than simple classification technique. However, no other botnet detection approaches so far have applied stream...

2017
C.G.J. Putman

Botnets continue to be an active threat against institutions and individuals worldwide. Previous research regarding botnets has unveiled information on how the system and their stakeholders operate, but an insight on the economic structure behind these stakeholders is lacking. The objective of this research is to build the business model and determine the structure of the underground botnet eco...

2008
Sandeep Sarat

While the Internet has revolutionalized the communication landscape, it continues to be plagued by issues of robustness and security that threaten the network’s operation. In this dissertation, we employ a multi-faceted approach to tackle these issues. Specifically, measurement studies are performed to experimentally quantify the ground truth related to the robustness of the Internet infrastruc...

Journal: :IEEE Transactions on Dependable and Secure Computing 2023

The growing adoption of the Internet Things (IoT) has brought a significant increase in attacks targeting those devices. Machine learning (ML) methods have shown promising results for intrusion detection; however, scarcity IoT datasets remains limiting factor developing ML-based security systems scenarios. Static get outdated due to evolving architectures and threat landscape; meanwhile, testbe...

2010
Igor Kotenko Alexey Konovalov Andrey Shorov

Nowadays we are witnesses of the rapid spread of botnets across the Internet and using them for different cyber attacks against our systems. Botnets join a huge number of compromised computers in the Internet and allow using these computers for performing vulnerability scans, distributing denial-of-service (DDoS) attacks and sending enormous amounts of spam emails. It is a very complex task to ...

2012
S. S. Garasia D. P. Rana R. G. Mehta

Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyberattacks. A botnet is a group of compromised computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, spam, click fraud, identity theft and information phishing. The defining characteristic of botnets is the use of command an...

Journal: :Computer Networks 2013
Guanhua Yan

In order to evade detection of ever-improving defense techniques, modern botnet masters are constantly looking for new communication platforms for delivering C&C (Command and Control) information. Attracting their attention is the emergence of online social networks such as Twitter, as the information dissemination mechanism provided by these networks can naturally be exploited for spreading bo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید