نتایج جستجو برای: botnet life cycle
تعداد نتایج: 976603 فیلتر نتایج به سال:
Botnets have become one of the major attacks in current Internet due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defense systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviors, they are widely used by security d...
We propose a novel stream data classification technique to detect Peer to Peer botnet. Botnet traffic can be considered as stream data having two important properties: infinite length and drifting concept. Thus, stream data classification technique is more appealing to botnet detection than simple classification technique. However, no other botnet detection approaches so far have applied stream...
While the Internet has revolutionalized the communication landscape, it continues to be plagued by issues of robustness and security that threaten the network’s operation. In this dissertation, we employ a multi-faceted approach to tackle these issues. Specifically, measurement studies are performed to experimentally quantify the ground truth related to the robustness of the Internet infrastruc...
escalating development of tourism and petroleum industries in small islands such as lavan-iranrequires sound solid waste management. in the present investigation, three scenarios which consist of thecombination of landfill, recycling, incineration and composting and their environmental impacts have beenevaluated for 7514 kg/day of waste generation in lavan island. for this purpose, life cycle a...
in this study a pseudo comprehensive carbon footprint model for fossil fuel power plants is presented. parameters which their effects are considered in this study include: plant type, fuel type, fuel transmission type, internal consumption of the plant, degradation, site ambient condition, transmission and distribution losses. investigating internal consumption, degradation and site ambient con...
kambeiz talebi, the author of the article discusses the urgent needfor topmanagers to change their style in small entrepreneurial firms during a business life cycle. although most leadership theories assume that it is an easy task, but the case studies and practical experience suggest the opposite - managers find it hard to move from an innovative style when the company is young to taskoriente...
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet's communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet's C2 tra...
Nowadays we are witnesses of the rapid spread of botnets across the Internet and using them for different cyber attacks against our systems. Botnets join a huge number of compromised computers in the Internet and allow using these computers for performing vulnerability scans, distributing denial-of-service (DDoS) attacks and sending enormous amounts of spam emails. It is a very complex task to ...
Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyberattacks. A botnet is a group of compromised computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, spam, click fraud, identity theft and information phishing. The defining characteristic of botnets is the use of command an...
In order to evade detection of ever-improving defense techniques, modern botnet masters are constantly looking for new communication platforms for delivering C&C (Command and Control) information. Attracting their attention is the emergence of online social networks such as Twitter, as the information dissemination mechanism provided by these networks can naturally be exploited for spreading bo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید