نتایج جستجو برای: botnet life cycle

تعداد نتایج: 976603  

Journal: :IJICS 2010
Ping Wang Lei Wu Ryan Cunningham Cliff Changchun Zou

Botnets have become one of the major attacks in current Internet due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defense systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviors, they are widely used by security d...

2008
Mohammad M. Masud Jing Gao Latifur Khan Jiawei Han Bhavani Thuraisingham

We propose a novel stream data classification technique to detect Peer to Peer botnet. Botnet traffic can be considered as stream data having two important properties: infinite length and drifting concept. Thus, stream data classification technique is more appealing to botnet detection than simple classification technique. However, no other botnet detection approaches so far have applied stream...

2008
Sandeep Sarat

While the Internet has revolutionalized the communication landscape, it continues to be plagued by issues of robustness and security that threaten the network’s operation. In this dissertation, we employ a multi-faceted approach to tackle these issues. Specifically, measurement studies are performed to experimentally quantify the ground truth related to the robustness of the Internet infrastruc...

Journal: :international journal of environmental research 2012
f. shams fallah h. vahidi m. pazoki f. akhavan-limudehi a.r. aslemand

escalating development of tourism and petroleum industries in small islands such as lavan-iranrequires sound solid waste management. in the present investigation, three scenarios which consist of thecombination of landfill, recycling, incineration and composting and their environmental impacts have beenevaluated for 7514 kg/day of waste generation in lavan island. for this purpose, life cycle a...

Journal: :global journal of environmental science and management 0
f. dalir department of environmental engineering, graduate faculty of environment, university of tehran, tehran, iran m. shafiepour motlagh department of environmental engineering, graduate faculty of environment, university of tehran, tehran, iran k. ashrafi department of environmental engineering, graduate faculty of environment, university of tehran, tehran, iran

in this study a pseudo comprehensive carbon footprint model for fossil fuel power plants is presented. parameters which their effects are considered in this study include: plant type, fuel type, fuel transmission type, internal consumption of the plant, degradation, site ambient condition, transmission and distribution losses. investigating internal consumption, degradation and site ambient con...

Journal: :iranian journal of management studies 2011
kambeiz talebi

kambeiz talebi, the author of the article discusses the urgent needfor topmanagers to change their style in small entrepreneurial firms during a business life cycle. although most leadership theories assume that it is an easy task, but the case studies and practical experience suggest the opposite - managers find it hard to move from an innovative style when the company is young to taskoriente...

2014
Basil AsSadhan José M.F. Moura

Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet's communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet's C2 tra...

2010
Igor Kotenko Alexey Konovalov Andrey Shorov

Nowadays we are witnesses of the rapid spread of botnets across the Internet and using them for different cyber attacks against our systems. Botnets join a huge number of compromised computers in the Internet and allow using these computers for performing vulnerability scans, distributing denial-of-service (DDoS) attacks and sending enormous amounts of spam emails. It is a very complex task to ...

2012
S. S. Garasia D. P. Rana R. G. Mehta

Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyberattacks. A botnet is a group of compromised computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, spam, click fraud, identity theft and information phishing. The defining characteristic of botnets is the use of command an...

Journal: :Computer Networks 2013
Guanhua Yan

In order to evade detection of ever-improving defense techniques, modern botnet masters are constantly looking for new communication platforms for delivering C&C (Command and Control) information. Attracting their attention is the emergence of online social networks such as Twitter, as the information dissemination mechanism provided by these networks can naturally be exploited for spreading bo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید