نتایج جستجو برای: botnet life cycle

تعداد نتایج: 976603  

Journal: :Jurnal Elektronika, Listrik dan Teknologi Informasi Terapan (ELTI) 2022

Botnet dikenalpasti sebagai salah satu ancaman yang paling banyak muncul kerana penjenayah Siber berusaha gigih untuk menjadikan sebahagian besar pengguna rangkaian komputer sasaran mereka. Oleh itu, ramai penyelidik telah menjalankan kajian mengenai botnet dan cara mengesan dalam trafik rangkaian. Kebanyakan mereka hanya menggunakan ciri di sistem tanpa menyebut pengaruh pengesanan botnet. Pem...

Journal: :J. Internet Serv. Inf. Secur. 2016
Asem Kitana Issa Traoré Isaac Woungang

This paper studies the impact of a mobile botnet on a Long Term Evolution (LTE) network by implementing a mobile botnet architecture that initiates a Distributed Denial of Service (DDoS) attack. To understand the behavior of the mobile botnet, a correlation between the mobile devices’ mobility and the DDoS attack is established. Real traces of taxi cabs are used to simulate the mobile devices’ ...

2008
Wade Gobel

One of the most prevalent problems in modern internet security is the botnet – large numbers of computers running the same malicious, self-propagating program without their users' knowledge. Bot programs communicate with their (human) botmaster, who can command them to stage distributed denial of service attacks, send spam, commit click fraud, send back user passwords, or any number of other il...

Journal: :IJSN 2010
Zesheng Chen Chao Chen Qian Wang

Botnets have become one of top threats to the Internet. Many detection methods have been developed to distinguish botnet behaviors from normal human behaviors. Future botnets, however, may incorporate the characteristics of human beings and weaken the existing detection techniques. In this work, we present a novel intelligent botnet, called the delay-tolerant botnet, that intentionally adds ran...

Journal: :NBER Macroeconomics Annual 2004

2014
Chunyong Yin

Botnets are a serious security threat to the current Internet infrastructure. In this paper, we propose a novel direction for P2P botnet detection called node-based detection. This approach focuses on the network characteristics of individual nodes. Based on our model, we examine node's flows and extract the useful features over a given time period. We have tested our approach on real-life data...

2016
Yizheng Chen Panagiotis Kintis Manos Antonakakis Yacin Nadji David Dagon Wenke Lee Michael Farrell

Online advertising is a complex on-line business, which has become the target of abuse. Recent charges filed from the United States Department of Justice against the operators of the DNSChanger botnet stated that the botnet operators stole approximately US$14 million [11,18] over two years. Using monetization tactics similar to DNSChanger, several large botnets (i.e., ZeroAccess and TDSS/TDL4) ...

Journal: :CoRR 2017
Juan Echeverría Shi Zhou

Many Twitter users are bots. They can be used for spamming, opinion manipulation and online fraud. Recently, we discovered the Star Wars botnet, consisting of more than 350,000 bots tweeting random quotations exclusively from Star Wars novels. The bots were exposed because they tweeted uniformly from any location within two rectangle-shaped geographic zones covering Europe and the USA, includin...

2012
Arun kumar

A “botnet” consists of a network of compromised computers controlled by an attacker often called botmaster. Recently, botnets have become the root cause of many Internet attacks. To be well-prepared for future attacks, it is not only study how to detect and defend against the botnets that have appeared in the past. More importantly, we should study advanced botnet designs that could be develope...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید