The Research on Approaches for Botnet Detection

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BotOnus: an online unsupervised method for Botnet detection

Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...

متن کامل

Revealing the Criterion on Botnet Detection Technique

Botnet have already made a big impact that need much attention as one of the most emergent threats to the Internet security. More worst when the peer-to-peer (P2P) botnets take the inspiration and underlying P2P technology to exchange files making botnets much harder to detect and shut down. It make botnets are the biggest threat to internet stability and security. Hence, Botnet detection and p...

متن کامل

Review of the Research on Botnet

The botnet is controlled by an attacker, which is formed by a lot of vulnerable hosts. The botnet is one of the biggest threats on the Internet. The attacker usually uses it to attack, such as: spam, distributed denial of service attacks, fraud and so on. In this paper, we mainly study the control channel of the botnet, including the IRC protocol, the P2P protocol and the HTTP protocol. At the ...

متن کامل

BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Energy Procedia

سال: 2011

ISSN: 1876-6102

DOI: 10.1016/j.egypro.2011.12.792