Botnet Tracking Tools

ثبت نشده
چکیده

Botnets are a serious threat to internet security. Botnets consist of networked collections of compromised machines called robots or ‘bots’ for short. Bots are also called ‘zombies,’ and botnets are also called ‘zombie armies.’ Bots are controlled by nodes called ‘botmasters’ or ‘botherders.’ Bots are infected with malicious code that performs work on behalf of the botmaster or botherder. Botnets are used to conduct cyber warfare, perform massive identity theft, store and disseminate malware and pornography, execute massive spam campaigns, and implement distributed Denial of Service attacks. Botnets today can provide the processing power of a supercomputer and perform a sustained Denial of Service attack powerful enough to take a country off line. This paper will discuss botnet detection tools and techniques, organization and architectures, protocols, and lifecycle. Botnet Tracking Tools! 2 ! Pierce!Gibbs,[email protected]! ! !

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Botnet Tracking Tools

Botnets are a serious threat to internet security. Botnets consist of networked collections of compromised machines called robots or ‘bots’ for short. Bots are also called ‘zombies,’ and botnets are also called ‘zombie armies.’ Bots are controlled by nodes called ‘botmasters’ or ‘botherders.’ Bots are infected with malicious code that performs work on behalf of the botmaster or botherder. Botne...

متن کامل

Botnet Tracking Tools

Botnets are a serious threat to internet security. Botnets consist of networked collections of compromised machines called robots or ‘bots’ for short. Bots are also called ‘zombies,’ and botnets are also called ‘zombie armies.’ Bots are controlled by nodes called ‘botmasters’ or ‘botherders.’ Bots are infected with malicious code that performs work on behalf of the botmaster or botherder. Botne...

متن کامل

A Scalable Architecture for Persistent Botnet Tracking

The botnet phenomenon has recently garnered attention throughout both academia and industry. Unfortunately, botnets are still a mystery. In fact, today, very little is known about even the most basic botnet properties, such as size, growth, or demographics. The primary reason for this lack of knowledge is the fact that the existing approaches for measuring such properties are simply inadequate;...

متن کامل

The Case for a Collaborative Universal Peer-to-Peer Botnet Investigation Framework

Peer to Peer (P2P) botnets are becoming widely used as a low overhead, efficient, self maintaining, distributed alternative to the traditional client/server model across a broad range of cyberattacks. These cyberattacks can take the form of distributed denial of service attacks, authentication cracking, spamming, cyberwarfare or malware distribution targeting on financial systems. These attacks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017