نتایج جستجو برای: botnet life cycle

تعداد نتایج: 976603  

Journal: :international journal of environmental research 2015
y. kalmykova u. palme s. yu k. karlfeldt fedje

urban sinks accumulate phosphorus and other elements and may serve as sources of secondaryraw materials. this paper evaluates phosphorus sources based on their environmental impact. in a life cycleassessment (lca) the conventional production was used as a yardstick against which tomeasure the performanceof two recycling options: spreading of sewage sludge and phosphorus recovery from municipal ...

Journal: :international journal of civil engineering 0
h. behbahani iran university of science and technology, narmak, tehran, 16846-13114. h. yaghoubi room 13, 2nd floor, railway research centre, central railway admistration building, argentina square, tehran, iran. m. a. rezvani iran university of science and technology, narmak, tehran , iran, 16846-13114.

magnetic levitation (maglev) is amongst the most advanced technologies that are available to the transportation industries. it has already been noticed by decision makers in many countries around the globe. contrary to such high levels of interest, there are no practical algorithms available to the engineers and/or managers to assist them in analyzing economics of the maglev systems. therefore,...

Journal: :CoRR 2013
Aymen Hasan Rashid Al Awadi Bahari Belaton

Botnets are considered one of the most dangerous and serious security threats facing the networks and the Internet. Comparing with the other security threats, botnet members have the ability to be directed and controlled via C&C messages from the botmaster over common protocols such as IRC and HTTP, or even over covert and unknown applications. As for IRC botnets, general security instances lik...

Journal: :JDFSL 2015
Thomas Hyslip Jason Pittman

Botnets have evolved to become one of the most serious threats to the Internet and there is substantial research on both botnets and botnet detection techniques. This survey reviewed the history of botnets and botnet detection techniques. The survey showed traditional botnet detection techniques rely on passive techniques, primarily honeypots, and that honeypots are not effective at detecting p...

2018
Ivan Letteri Massimo Del Rosso Pasquale Caianiello Dajana Cassioli

The recent evolution of Internet to new paradigms such as network function virtualization and software defined networking poses new relevant challenges to the detection of Botnet attacks, calling for innovative approaches. In this work we propose a detection mechanism based on an Artificial Neural Net classifier trained by available data sets collected in conventional networks. We apply such de...

2012
S. Nair Vinodh Ewards

A botnet is a network of compromised computers, termed bots that are used for malicious purposes. When a computer becomes compromised typically through a drive-by download, that has embedded malicious software, that computer becomes a part of a botnet. A bot typically runs hidden and uses a covert channel to communicate with its command and control server. Botnets are controlled through protoco...

2012
Daan de Graaf Ahmed F. Shosha Pavel Gladyshev

A recent emerging trend in the underground economy is malware dissemination as a service. Complex botnet infrastructures are developed to spread and install malware for third-party customers. In this research work, a botnet forensic investigation model is proposed to investigate and analyze large-scale botnets. The proposed investigation model is applied to a real-world law-enforcement investig...

Journal: :JCP 2012
Guining Geng Guoai Xu Miao Zhang Yanhui Guo Guang Yang Cui Wei

Botnets have become one of the most serious security threats to the traditional Internet world. Although the mobile botnets have not yet caused major outbreaks worldwide in cellular network, but most of the traditional botnet experience can be transferred to mobile botnet on mobile devices, so mobile botnet may evolve faster since techniques are already explored. From the theoretical work of so...

2007
Moheeb Abu Rajab Jay Zarfoss Fabian Monrose Andreas Terzis

As if fueled by its own fire, curiosity and speculation regarding botnet sizes abounds. Among researchers, in the press, and in the classroom—the questions regarding the widespread effect of botnets seem never-ending: what are they? how many are there? what are they used for? Yet, time and time again, one lingering question remains: how big are today’s botnets? We hear widely diverging answers....

2016
Brandon Shirley Chad D. Mano

Botnets have evolved to incorporate peer-to-peer communication for the purpose of better hiding the administrative source of the botnet. Current botnet detection mechanisms identify network traffic patterns at strategic locations within a network such as the gateway. As detection techniques improve, botnet design will continue to evolve to evade detection; thus, it is advantageous to identify p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید