منابع مشابه
Nepenthes Honeypots based Botnet Detection
Thenumbers of the botnet attacks areincreasing day by day and the detection of botnet spreading in the network has become very challenging. Bots are having specific characteristics incomparison of normal malware as they are controlled by the remote master server and usually don’t show their behavior like normal malware until they don’t receive any command from their master server. Most of time ...
متن کاملAdaptability of IRC Botnet Detection Method to P2P Botnet Detection
This report mainly discusses the adaptability of the IRC-based Bot detection method to be used in the P2P-based Bot detection. The first section introduces the IRC-based bot and the newly appeared P2P-based bot to see their difference. The second section shows the related work and the traditional method of BOTNET detection. The third section discusses the methodology used by the IRC based Botne...
متن کاملBotnet Detection Framework
Botnet ia a collection on network of bots. i.e the collection of zombie computers which are controlled by a single person or group known as bot master or herder. This paper focuses on botnet detection framework and proposed a generic framework for botnet detection. The proposed framework is based on the approach of passively monitoring network traffic. This paer also show the flow chart of Gene...
متن کاملHybrid Botnet Detection Mechanism
Botnets have emerged as one of the biggest threats to internet security in the recent years. They have confounded security researchers because of their mobile and secretive behavior. A Botnet is a network of zombie machines remotely controlled by a command server or a Botmaster. These compromised host machines may be used for sending spam, launching DOS attacks, spying or stealing information. ...
متن کاملBotnet Detection with DNS Monitoring
Botnets are today the universal tool for malicious activities in the Internet. They can send out spam messages, host fairly redundant malicious webpages, perform DDoS attacks and do much more. Of course, researchers have therefore been trying to effectively find and shut down botnets as quickly as possible. The Domain Name System has become an important part of such botnets, for both the botmas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Advances in Information Technology
سال: 2012
ISSN: 1798-2340
DOI: 10.4304/jait.3.4.215-221