نتایج جستجو برای: botnet life cycle

تعداد نتایج: 976603  

Journal: :J. Internet Serv. Inf. Secur. 2013
Yonglin Zhou Qing-Shan Li Qidi Miao Kangbin Yim

In recent years, an increasing number of botnets use Domain Generation Algorithms (DGAs) to bypass botnet detection systems. DGAs, also referred as “domain fluxing”, has been used since 2004 for botnet controllers, and now become an emerging trend for malware. It can dynamically and frequently generate a large number of random domain names which are used to prevent security systems from detecti...

2009
Tatsuya Mori Holly Esquivel Aditya Akella Akihiro Shimoda Shigeki Goto

On November 11, 2008, the primary web hosting company, McColo, for the command and control servers of Srizbi botnet was shutdown by its upstream ISPs. Subsequent reports claimed that the volume of spam dropped significantly everywhere on that very same day. In this work, we aim to understand the world’s worst spamming botnet, Srizbi, and to study the effectiveness of targeting the botnet’s comm...

Journal: :CoRR 2018
Di Zhuang J. Morris Chang

Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the fundamental infrastructure that responsible for various cyber-crimes. More challenges are involved in the problem of detecting P2P botnets, despite a few existing works claimed to detect traditional botnets effectively. In this paper, we present Enhanced PeerHunter, a network-flow level botnet...

Journal: :JNW 2010
Xiaocong Yu Xiaomei Dong Ge Yu Yuhai Qin Dejun Yue Yan Zhao

Botnet detection has attracted lots of attention since botnet attack is becoming one of the most serious threats on the Internet. But little work has considered the online detection. In this paper, we propose a novel approach that can monitor the botnet activities in an online way. We define the concept of “feature streams” to describe raw network traffic. If some feature streams show high simi...

2016
Matija Stevanovic Jens Myrup Pedersen

Botnets, as networks of compromised “zombie” computers, represent one of the most serious security threats on the Internet today. This paper explores how machines compromised with bot malware can be identified at local and enterprise networks in accurate and time-efficient manner. The paper introduces a novel multi-level botnet detection approach that performs network traffic analysis of three ...

2011
Theodore Reed Joseph Geis Sven Dietrich

SkyNET is a stealth network that connects hosts to a botmaster through a mobile drone. The network is comprised of machines on home Wi-Fi networks in a proximal urban area, and one or more autonomous attack drones. The SkyNET is used by a botmaster to command their botnet(s) without using the Internet. The drones are programmed to scour an urban area and compromise wireless networks. Once compr...

2011
Ta-Te Lu Hung-Yi Liao Ming-Feng Chen

Recently, malware attacks have become more serious over the Internet by e-mail, denial of service (DoS) or distributed denial of service (DDoS). The Botnets have become a significant part of the Internet malware attacks. The traditional botnets include three parts – botmaster, command and control (C&C) servers and bots. The C&C servers receive commands from botmaster and control the distributio...

Journal: :Security and Communication Networks 2012
Do-Hoon Kim Taek Lee Jaewoo Kang Hyunchoel Jeong Hoh Peter In

Botnets are a disastrous threat because they execute malicious activities such as distributed denial-of-service, spam email, malware downloads (such as eggdownloads), and spying by exploiting zombie PCs under their control. Botnets infect PCs on a huge scale by initially scanning the service ports of vulnerable applications for the purpose of propagation, which is leveraged as the size of the b...

2013
Heloise Pieterse Martin Olivier

The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. A mobile botnet is defined as a collection of compromised smartphones controlled by a botmaster through a command and control network to serve a malicious purpose. This study presents the design of a hybri...

Journal: :Simetris (Cepu) 2021

Botnet Proteus dianggap sebagai salah satu botnet yang mengerikan dampaknya terhadap dunia internet di kisaran tahun 2017, ini mulai dideteksi akhir 2016 dan terus menyebar setelahnya. adalah sample virusnya sulit didapatkan sehingga sangat sedikit penelitian membahasnya. Dalam digunakan pendekatan static dinamis untuk proses analisis botnet, dilakukan dengan file virus secara langsung, sedangk...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید