Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists
نویسندگان
چکیده
منابع مشابه
Effective Signature Based Intrusion Detection System Using Ip Address Security
Many applications require high degree of sensor node to identify their locations in wireless sensor network. Location information is gathered from manual setting or GPS device. Since manual setting requires huge cost of human time, and GPS requires expensive device cost. Both approaches are not applicable for large scale WSN. The mobile anchor node is used to finding the position of unknown loc...
متن کاملSolaris IP Duplicate Address Detection
This document describes the current design of the Solaris IP Duplicate Address Detection (DAD) logic, its problems, and a new design that fixes these problems.
متن کاملA DNS-based Countermeasure Technology for Bot Worm-infected PC terminals in the Campus Network
The DNS query traffic in a campus top domain DNS server were statistically investigated in order to find out the security incidents, especially bot worm (BW)-infected PCs on the campus network. The interesting results are obtained: (1) The total traffic of the DNS query access from the outside of the campus network frequently correlates with that of the number of their unique source IP addresse...
متن کاملHitlist Worm Detection using Source IP Address History
Internet worms are a growing menace due to their increasing sophistication and speed of propagation. In this paper, we present a new worm detection scheme, History-based IP Worm Detection. It uses the difference in the distribution of source addresses between regular users and scanning hosts to distinguish between worm probes and normal accesses. This property is used to implement a weighted so...
متن کاملDestination Address Entropy based Detection and Traceback Approach against Distributed Denial of Service Attacks
With all the brisk growth of web, distributed denial of service attacks are becoming the most serious issues in a data center scenarios where lot many servers are deployed. A Distributed Denial of Service attack generates substantial packets by a large number of agents and can easily tire out the processing and communication resources of a victim within very less period of time. Defending DDoS ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Processing
سال: 2011
ISSN: 1882-6652
DOI: 10.2197/ipsjjip.19.169