نتایج جستجو برای: botnet

تعداد نتایج: 1363  

2013
Christian Rossow Dennis Andriesse Tillmann Werner Brett Stone-Gross Daniel Plohmann Christian J. Dietrich Herbert Bos

Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet controllers have sought new ways to harden the infrastructures of their botnets. In order to meet this objective, some botnet operators have (re)designed their botnets to use Peer-to-Peer (P2P) infrastructures. Many P2P botnets are far more resilient to takedown attempts ...

2009
Yao Zhao Yinglian Xie Fang Yu Qifa Ke Yuan Yu Yan Chen Eliot Gillum

Network security applications often require analyzing huge volumes of data to identify abnormal patterns or activities. The emergence of cloud-computing models opens up new opportunities to address this challenge by leveraging the power of parallel computing. In this paper, we design and implement a novel system called BotGraph to detect a new type of botnet spamming attacks targeting major Web...

2009
John P. John Alexander Moshchuk Steven D. Gribble Arvind Krishnamurthy

In this paper we present Botlab, a platform that continually monitors and analyzes the behavior of spamoriented botnets. Botlab gathers multiple real-time streams of information about botnets taken from distinct perspectives. By combining and analyzing these streams, Botlab can produce accurate, timely, and comprehensive data about spam botnet behavior. Our prototype system integrates informati...

2014
P.Senthil vadivu

Peer-to-peer network is a decentralized and distributed network where an individual nodes in the network performs as both providers and consumers of resources. This type of network is different from centralized network. In the centralized network, the client requests queries for accessing resources to the central servers. Malware is a harmful effect in the peer-to-peer networks. In the peer-to-...

2014
Young Hoon Moon Suk Bong Choi Huy Kang Kim Changsok Yoo

As malicious traffic from botnets now threatens the network infrastructure of Internet Service Providers (ISPs), the importance of controlling botnets is greater than ever before. However, it is not easy to handle rapidly evolving botnets efficiently because of the highly evolved detection avoidance techniques used by botnet makers. Further, nowadays, Distributed Denial of Service (DDoS) attack...

2014
K. E Narayana

Aggressors, particularly botnet controllers, use stealthy briefing systems to set up sweeping scale summon and control. To proficiently appreciate the potential limit of aggressors, they have investigated the likelihood of using territory name organization (DNS) as a stealthy botnet charge and-control channel. They have depicted and quantitatively research a few systems that could be used to en...

2010
Antonio Nappa Aristide Fattori Marco Balduzzi Matteo Dell'Amico Lorenzo Cavallaro

Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Although Skype is a closed source application, an API allows developers to build custom plugins which interact over the Skype network, taking advantage of its reliability and capability to easily bypass firewalls and NAT devices. ...

2017
Jeffrey Pawlick Quanyan Zhu

While the Internet of things (IoT) promises to improve areas such as energy efficiency, health care, and transportation, it is highly vulnerable to cyberattacks. In particular, distributed denial-of-service (DDoS) attacks overload the bandwidth of a server. But many IoT devices form part of cyber-physical systems (CPS). Therefore, they can be used to launch “physical” denial-of-service attacks ...

2013
Diogo Mónica Carlos Ribeiro

Botnets are large networks of infected computers controlled by an attacker. Much effort has already been invested in the detection and analysis mechanisms, capable of defusing this type of threat. However, botnets have been constantly evolving, and will certainly continue to do so. We must, therefore, make an effort to foresee and study possible future designs, if we are to be capable of timely...

Journal: :I. J. Network Security 2018
Ramesh Singh Rawat Emmanuel S. Pilli Ramesh Chandra Joshi

Botnet is a network of compromised computers controlled by the attacker(s) from remote locations via Command and Control (C&C) channels. The botnets are one of the largest global threats to the Internet-based commercial and social world. The decentralized Peer-to-Peer (P2P) botnets have appeared in the recent past and are growing at a faster pace. These P2P botnets are continuously evolving fro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید