نتایج جستجو برای: botnet

تعداد نتایج: 1363  

2016
Pooja Devi Sanjeev Kumar Neeraj Sharma

In the field of internet security botnet is becoming the significant threat as more number of users are connected to internet. Botnet which is a collection of infected computers so called (bots) are becoming the major threat to internet community. The difference between a malware and botnet is that bot is remotely controlled by a C&C server which are under the control of a botmaster. Here in th...

Journal: :Information Security Journal: A Global Perspective 2014
Zhen Li Qi Liao

Zhen Li1 and Qi Liao2 1Department of Economics and Management, Albion College, Albion, Michigan, USA 2Department of Computer Science, Central Michigan University, Mount Pleasant, Michigan, USA ABSTRACT Economics play an increasingly important role in fighting cyber crimes. While the arms race against botnet problems has achieved limited success, we propose an approach attacking botnets through ...

Journal: :IJCNIS 2017
Nur Hidayah Mohd Saudi M. A. Faizal Siti Rahayu Selamat Rudy Fadhlee M. D Wan Ahmad Ramzi W. Y.

Botnet are identified as one of most emerging threats due to Cybercriminals work diligently to make most of the part of the users’ network of computers as their target. In conjunction with that, many researchers has conduct a lot of study regarding on the botnets and ways to detect botnet in network traffic. Most of them only used the feature inside the system without mentioning the feature inf...

Journal: :IJDCF 2016
Fenggang Sun Lidong Zhai Yue-Jin Du Peng Wang Jun Li

In recent years, botnet has become one of the most serious security threats to Internet. With the rapid development of mobile network and the popularity of smartphones, botnet began to spread to mobile platform. In order to counter mobile botnet, it is meaningful to study its constructive mechanism and reproduce it. In the past studies, researchers have designed several kinds of mobile botnet m...

2008
W. Timothy Strayer David E. Lapsley Robert Walsh Carl Livadas

Current techniques for detecting botnets examine traffic content for IRC commands, monitor DNS for strange usage, or set up honeynets to capture live bots. Our botnet detection approach is to examine flow characteristics such as bandwidth, packet timing, and burst duration for evidence of botnet command and control activity. We have constructed an architecture that first eliminates traffic that...

2017
K. Rameshkumar

The presence of compromised hosts in any network degrades the performance in many ways. The compromised nodes form the botnet and the detection of them is most primary solution to improve the network performance. The problem of botnet detection has been approached in many ways using fl ow factors but does not produce a remarking solution. To improve the botnet detection effi ciency, a novel sta...

2008
David Dittrich Sven Dietrich

Over the last few years, researchers and network operators have examined networks of DDoS agents, more recently called botnets due to their connection to Internet Relay Chat (IRC). In the continued quest to take down these networks of bots, two important questions arise: how many bots are there, and how to find every last bot? When one reads about a ten thousand, hundred thousand, one million n...

2008
Elizabeth Stinson John C. Mitchell

Automated bot/botnet detection is a difficult problem given the high level of attacker power. We propose a systematic approach for evaluating the evadability of detection methods. An evasion tactic has two associated costs: implementation complexity and effect on botnet utility. An evasion tactic’s implementation complexity is based on the ease with which bot writers can incrementally modify cu...

2017
Di Wu Binxing Fang Fangjiao Zhang

Botnet continue to be a significant threat to Internet. Accordingly, the present research of botnet traffic detection mainly based on the assumption that communication or attack flows between a botnet tend to have space-time similarities. However, in order to bypass existing detection systems, attackers begin to add some randomness to the process of botnet propagation and control to make the fe...

2016
Ahmad Karim Rosli Salleh Muhammad Khurram Khan

Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed D...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید