نتایج جستجو برای: botnet

تعداد نتایج: 1363  

Journal: :CoRR 2018
Di Zhuang J. Morris Chang

Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the fundamental infrastructure that responsible for various cyber-crimes. More challenges are involved in the problem of detecting P2P botnets, despite a few existing works claimed to detect traditional botnets effectively. In this paper, we present Enhanced PeerHunter, a network-flow level botnet...

Journal: :JNW 2010
Xiaocong Yu Xiaomei Dong Ge Yu Yuhai Qin Dejun Yue Yan Zhao

Botnet detection has attracted lots of attention since botnet attack is becoming one of the most serious threats on the Internet. But little work has considered the online detection. In this paper, we propose a novel approach that can monitor the botnet activities in an online way. We define the concept of “feature streams” to describe raw network traffic. If some feature streams show high simi...

2016
Matija Stevanovic Jens Myrup Pedersen

Botnets, as networks of compromised “zombie” computers, represent one of the most serious security threats on the Internet today. This paper explores how machines compromised with bot malware can be identified at local and enterprise networks in accurate and time-efficient manner. The paper introduces a novel multi-level botnet detection approach that performs network traffic analysis of three ...

2011
Theodore Reed Joseph Geis Sven Dietrich

SkyNET is a stealth network that connects hosts to a botmaster through a mobile drone. The network is comprised of machines on home Wi-Fi networks in a proximal urban area, and one or more autonomous attack drones. The SkyNET is used by a botmaster to command their botnet(s) without using the Internet. The drones are programmed to scour an urban area and compromise wireless networks. Once compr...

2011
Ta-Te Lu Hung-Yi Liao Ming-Feng Chen

Recently, malware attacks have become more serious over the Internet by e-mail, denial of service (DoS) or distributed denial of service (DDoS). The Botnets have become a significant part of the Internet malware attacks. The traditional botnets include three parts – botmaster, command and control (C&C) servers and bots. The C&C servers receive commands from botmaster and control the distributio...

Journal: :Security and Communication Networks 2012
Do-Hoon Kim Taek Lee Jaewoo Kang Hyunchoel Jeong Hoh Peter In

Botnets are a disastrous threat because they execute malicious activities such as distributed denial-of-service, spam email, malware downloads (such as eggdownloads), and spying by exploiting zombie PCs under their control. Botnets infect PCs on a huge scale by initially scanning the service ports of vulnerable applications for the purpose of propagation, which is leveraged as the size of the b...

2013
Heloise Pieterse Martin Olivier

The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. A mobile botnet is defined as a collection of compromised smartphones controlled by a botmaster through a command and control network to serve a malicious purpose. This study presents the design of a hybri...

Journal: :Simetris (Cepu) 2021

Botnet Proteus dianggap sebagai salah satu botnet yang mengerikan dampaknya terhadap dunia internet di kisaran tahun 2017, ini mulai dideteksi akhir 2016 dan terus menyebar setelahnya. adalah sample virusnya sulit didapatkan sehingga sangat sedikit penelitian membahasnya. Dalam digunakan pendekatan static dinamis untuk proses analisis botnet, dilakukan dengan file virus secara langsung, sedangk...

2014
Maarten H. Everts Pieter H. Hartel Maarten Everts

Botnets, large international networks of infected computers (so-called bots), play a central part in the digital underground economy, providing the infrastructure required for a multitude of malicious activities. To ensure a botnet keeps running, the botnet owner utilizes specialized technologies to send control messages to his bots, while keeping resilience against take down and stealth agains...

Journal: :CoRR 2013
S. Kumar R. Sehgal P. Singh Ankit Chaudhary

Thenumbers of the botnet attacks areincreasing day by day and the detection of botnet spreading in the network has become very challenging. Bots are having specific characteristics incomparison of normal malware as they are controlled by the remote master server and usually don’t show their behavior like normal malware until they don’t receive any command from their master server. Most of time ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید