نتایج جستجو برای: Botnet Life-Cycle

تعداد نتایج: 976603  

Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...

2017
C.G.J. Putman

Botnets continue to be an active threat against institutions and individuals worldwide. Previous research regarding botnets has unveiled information on how the system and their stakeholders operate, but an insight on the economic structure behind these stakeholders is lacking. The objective of this research is to build the business model and determine the structure of the underground botnet eco...

2015
Ibrahim Ghafir Jakub Svoboda Vaclav Prenosil

Internet users have been attacked by widespread email viruses earlier, but now scenario has been changed. Now attackers are no more interested to just attract media attention by infecting a large number of computers on the network; in fact, their interest has been shifted to compromising and controlling the infected computers for their personal profits. This new attack trend brings the concept ...

2014
Deepak Mane Kailas K. Devadkar Sardar Patel

BotNets are major threat of the current Internet. It is widespread malware and it arises commonly in today‟s cyber crime, which results in serious threats to our network. The compromised computer is infected by viruses, worms, or it has become a target of network attacks only when operational state of a network component is shifted from normal state to abnormal state. Thus, prevention and detec...

2007
Jay Zarfoss

The botnet phenomenon has recently garnered attention throughout both academia and industry. Unfortunately, botnets are still a mystery. In fact, today, very little is known about even the most basic botnet properties, such as size, growth, or demographics. The primary reason for this lack of knowledge is the fact that the existing approaches for measuring such properties are simply inadequate;...

Journal: :I. J. Network Security 2018
Ramesh Singh Rawat Emmanuel S. Pilli Ramesh Chandra Joshi

Botnet is a network of compromised computers controlled by the attacker(s) from remote locations via Command and Control (C&C) channels. The botnets are one of the largest global threats to the Internet-based commercial and social world. The decentralized Peer-to-Peer (P2P) botnets have appeared in the recent past and are growing at a faster pace. These P2P botnets are continuously evolving fro...

Journal: :CoRR 2013
Sukhdilpreet Kaur Amandeep Verma

With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal activities, which in turn, bids many network attacks and threats. Network forensics is used to detect the network attacks. This can be viewed as the extension of network...

2016
Joseph Desimone Daryl Johnson Bo Yuan Peter Lutz

Covert channels have the unique quality of masking evidence that a communication has ever occurred between two parties. For spies and terrorist cells, this quality can be the difference between life and death. However, even the detection of communications in a botnet could be troublesome for its creators. To evade detection and prevent insights into the size and members of a botnet, covert chan...

Journal: :Informatica 2023

In recent years, a large number of Internet Things devices are used in life, many which vulnerable to attacks from security perspective. Botnet malware is one the main threats IoT devices. Hence detection botnet most important challenge for This paper proposes an approach base on PSI graph data combine with evolutionary algorithm-based technique. To best our knowledge, there have been no studie...

2016
Mohammad Reza Rostami Norbik Bashah Idris Zuraini Ismail

Fast growth of Internet has brought some security concerns. One of these security concerns is Botnet. Bot and Botnets are new sophisticated kind of malware that is equipped with advanced features and have variety of applications. This paper reviews the current botnet detection frameworks and their advantages and drawbacks. To address the drawbacks we propose a conceptual holistic Botnet Detecti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید