نتایج جستجو برای: botnet life cycle
تعداد نتایج: 976603 فیلتر نتایج به سال:
introduction: food industry is one of the most important industries in developing countries that has an enormous role in employment, export and value added of the agricultural sector. iran as a developing country has a comparative advantage in food product industries for several reasons such as adequate and cheap raw materials and having several companies in the field of food industries. the fo...
Abstract Purpose The primary objective of this study was to evaluate the environmental impact and financial cost repairing surgical scissors. Methods We used life cycle assessment (LCA) analysis estimate impacts functional unit one use a reusable scissor (manufactured in Germany UK), three baseline scenarios were compared: no repair, onsite (hospital), offsite (external contract) repair. This ‘...
Recently, immigration and its socio-economic aspects have been in the centre of European Union leaders’ agenda. In this paper, we apply National Transfer Accounts (NTA) methodology to calculate complete set NTA results for immigrants natives five EU countries. We find that due lower labour income, which cannot be offset by consumption, experience a shorter independence period much aggregate lif...
Botnets allow malefactors manage millions of infected computers simultaneously and provide large-scale successful attacks. The paper suggests an approach for multi-agent simulation of botnets and botnet protection mechanisms. The main contribution of the paper is an improved simulation environment for agent based simulation of botnets and experimentation with this environment for analysis of di...
The networks of compromised and remotely controlled computers (bots) are widely used in many Internet fraudulent activities, especially in the distributed denial of service attacks. Brute force gives enormous power to bot masters and makes botnet traffic visible; therefore, some countermeasures might be applied at early stages. Our study focuses on detecting botnet propagation via public websit...
We develop new techniques to map botnet membership using traces of spam email. To group bots into botnets we look for multiple bots participating in the same spam email campaign. We have applied our technique against a trace of spam email from Hotmail Web mail services. In this trace, we have successfully identified hundreds of botnets. We present new findings about botnet sizes and behavior wh...
We consider the problem of using flow-level data for detection of botnet command and control (C&C) activity. We find that current approaches do not consider timingbased calibration of the C&C traffic traces prior to using this traffic to salt a background traffic trace. Thus, timing-based features of the C&C traffic may be artificially distinctive, potentially leading to (unrealistically) optim...
Botnets are collections of compromised computers which have come under the control of a malicious person or organisation via malicious software stored on the computers, and which can then be used to interfere with, misuse, or deny access to a wide range of Internet-based services. With the current trend towards increasing use of the Internet to support activities related to banking, commerce, h...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید