spying with bots
نویسنده
چکیده
[email protected] D U R I N G T H E P A S T F E W Y E A R S , W E have seen a shift in how systems are being attacked. After a successful compromise, a bot (also referred to as a zombie or drone) is often installed on the system. This small program provides a remote control mechanism to command the victim. Via this remote control mechanism, the attacker is able to issue arbitrary commands and thus has complete control over the victim’s computer system.
منابع مشابه
Discrete-Event Simulation of Botnet Protection Mechanisms
The common use of computers, connected to the Internet, as well as insufficient level of security, allow malefactors to execute large-scale infrastructure attacks, engaging in criminal activity a huge number of computing nodes. Attacks of such type have been traditionally performing by botnets. There are examples of successful large-scale attacks fulfilled by armies of bots. For example, attack...
متن کاملDEPARTMENT OF ECONOMICS WORKING PAPER SERIES Spying in Multi-market Oligopolies
We consider a multimarket framework where a set of firms compete on two interrelated oligopolistic markets. Prior to competing in these markets, firms can spy on others in order to increase the quality of their product. We characterize the equilibrium espionage networks and networks that maximize social welfare under the most interesting scenario of diseconomies of scope. We find that in some s...
متن کاملSpying as an Object-Oriented Programming Paradigm
We introduce spying, a novel way of programming with objects, based on capsule programming and reflective facilities. This programming style allows easy building of monitoring systems, such as tracers, debuggers. We point out three main problems related to this programming style, and propose practical solutions to some of them. We exemplify our claims with a system that performs master/slave co...
متن کاملSpying with the Crowd
The cooperative power of crowd workers has been recently shown to be effective in solving large-scale diverse tasks. We elaborately study one such application of collaborative crowdsourcing. In this paper, we discuss the viability and different facets of crowdspying, activity of spying with the power of crowd workers. This type of citizen involvement has diverse applications that also includes ...
متن کاملOn Profiling Bots in Social Media
The popularity of social media platforms such as Twitter has led to the proliferation of automated bots, creating both opportunities and challenges in information dissemination, user engagements, and quality of services. Past works on profiling bots had been focused largely on malicious bots, with the assumption that these bots should be removed. In this work, however, we find many bots that ar...
متن کامل