نتایج جستجو برای: botnet detection

تعداد نتایج: 566813  

Journal: :The International Journal of Forensic Computer Science 2008

Journal: :International Journal of Health Sciences (IJHS) 2022

Internet of things (IoT) is a boundless network that connects billions physical objects implanted with sensors through internet and other various forms connections. Since there involvement many devices, it requires security. To keep the IoT devices safe or making learn to protect itself help security from attackers. Common dangerous malwares detected in are botnets, specifically known as botnet...

2011
Ickin Vural Hein S. Venter

Malicious software infects large numbers of computers around the world. Once compromised, the computers become part of a botnet and take part in many forms of criminal activity, including the sending of unsolicited commercial email or spam. As mobile devices become tightly integrated with the Internet, associated threats such as botnets have begun to migrate onto the devices. This paper describ...

2012
S. S. Garasia D. P. Rana R. G. Mehta

Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyberattacks. A botnet is a group of compromised computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, spam, click fraud, identity theft and information phishing. The defining characteristic of botnets is the use of command an...

Journal: :I. J. Network Security 2015
Pijush Barthakur Manoj Dahal Mrinal Kanti Ghose

Botnet threat has increased enormously with adoption of newer technologies like root kit, anti-antivirus modules etc. by the hackers. Emergence of botnets having distributed C & C structure that mimic P2P technologically, has made its detection and dismantling extremely difficult. However, numeric flow feature values of P2P botnet C & C traffic can be used to generate fuzzy rule-set which can t...

2011
Adam J. Aviv Andreas Haeberlen

In this paper, we examine the challenges faced when evaluating botnet detection systems. Many of these challenges stem from difficulties in obtaining and sharing diverse sets of real network traces, as well as determining a botnet ground truth in such traces. On the one hand, there are good reasons why network traces should not be shared freely, such as privacy concerns, but on the other hand, ...

Journal: :CoRR 2013
Aymen Hasan Rashid Al Awadi Bahari Belaton

Botnets are considered one of the most dangerous and serious security threats facing the networks and the Internet. Comparing with the other security threats, botnet members have the ability to be directed and controlled via C&C messages from the botmaster over common protocols such as IRC and HTTP, or even over covert and unknown applications. As for IRC botnets, general security instances lik...

2016
Shi-Hao Wang Chia-Mei Chen Gu-Shin Lai

Nowadays, with increasing number of Internet users and its commercial character subsequently bring in proportionate number of criminal minded network security threats. Among various of malicious programs, the botnet is considered as one of the most critical issue for the current worldwide Internet users. Unfortunately, existing techniques for detecting botnetsespecially cross-site scripting (XS...

Journal: :IEEE Transactions on Control of Network Systems 2017

Journal: :Security and Communication Networks 2012
Do-Hoon Kim Taek Lee Jaewoo Kang Hyunchoel Jeong Hoh Peter In

Botnets are a disastrous threat because they execute malicious activities such as distributed denial-of-service, spam email, malware downloads (such as eggdownloads), and spying by exploiting zombie PCs under their control. Botnets infect PCs on a huge scale by initially scanning the service ports of vulnerable applications for the purpose of propagation, which is leveraged as the size of the b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید