نتایج جستجو برای: botnet life cycle

تعداد نتایج: 976603  

Journal: :Computer Networks 2013
Masood Khosroshahy Mustafa K. Mehmet Ali Dongyu Qiu

Botnets, overlay networks built by cyber criminals from numerous compromised network-accessible devices, have become a pressing security concern in the Internet world. Availability of accurate mathematical models of population size evolution enables security experts to plan ahead and deploy adequate resources when responding to a growing threat of an emerging botnet. In this paper, we introduce...

2008
Thorsten Holz Moritz Steiner Frederic Dahl Ernst W. Biersack Felix C. Freiling

Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised machines connect to the central server and wait for commands. However, the first botnets that use peer-to-peer (P2P) networks for remote control of the compromised machines appeared in the wild recently. In this paper, w...

2011
Gregory Fedynyshyn Mooi Choo Chuah Gang Tan

Unlike other types of malware, botnets are characterized by their command and control (C&C) channels, through which a central authority, the botmaster, may use the infected computer to carry out malicious activities. Given the damage botnets are capable of causing, detection and mitigation of botnet threats are imperative. In this paper, we present a host-based method for detecting and differen...

2011
Arash Habibi Lashkari Seyedeh Ghazal Ghalebandi Mohammad Reza Moradhaseli

Botnets are security threat now days, since they tend to perform serious internet attacks in vast area through the compromised group of infected machines. The presence of command and control mechanism in botnet structure makes them stronger than traditional attacks. Over course of the time botnet developer have switched to more advanced mechanism to evade each of which new detection methods and...

2008
Kapil Singh Abhinav Srivastava Jonathon T. Giffin Wenke Lee

The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have .focused on filtering out malicious payloads and weblinksfrom email; the potential dangers of email go past these boundaries: harmless-looking emails can carry dangerous, hidden botnet content. In this paper, we evaluate the suitability ofemail communicationf...

2013
David Y. Wang Stefan Savage Geoffrey M. Voelker

Black hat search engine optimization (SEO) campaigns attract and monetize traffic using abusive schemes. Using a combination of Web site compromise, keyword stuffing and cloaking, a SEO botnet operator can manipulate search engine rankings for key search terms, ultimately directing users to sites promoting some kind of scam (e.g., fake antivirus). In this paper, we infiltrate an influential SEO...

Journal: :JCS 2017
Atef A. Obeidat Majd Al-kofahi Mohammad Jazi Bawaneh Essam Said Hanandeh

Corresponding Author: Atef Ahmed Obeidat Department of Information Technology, Al-Huson University College, Al-Balqa Applied University, Salt, Jordan Email: [email protected] Abstract: Botnets remain an active security problem on the Internet and various computer networks. They are continuously developing with regard to protocols, structure and quality of attacks. Many botnet detection programs ...

2011
Yong Qiao Yuexiang Yang Jie He Bo Liu Yingzhi Zeng

It’s increasingly difficult to detect botnets since the introduction of P2P communication. The flow characteristics and behaviors can be easily hidden if an attacker exploits the common P2P applications’ protocol to build the network and communicate. In this paper, we analyze two potential command and control mechanisms for Parasite P2P Botnet, we then identify the quasi periodical pattern of t...

2015
Udaya Wijesinghe Udaya Kiran Tupakula Vijay Varadharajan

The botnet is a group of hijacked computers, which are employed under command and control mechanism administered by a botmaster. Botnet evolved from IRC based centralized botnet to employing common protocols such as HTTP with decentralized architectures and then peer-to-peer designs. As Botnets have become more sophisticated, the need for advanced techniques and research against botnets has gro...

Journal: :JNW 2011
Hailong Wang Jie Hou Zhenghu Gong

As technology has been developed rapidly, botnet threats to the global cyber community are also increasing. And the botnet detection has recently become a major research topic in the field of network security. Most of the current detection approaches work only on the evidence from single information source, which can not hold all the traces of botnet and hardly achieve high accuracy. In this pa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید