Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Bot herder"'
Autor:
Mehlführer, Max
Diese Arbeit untersucht Botnetze und Botnetze im Browser. Mithilfe einer literarischen Recherche wird die Frage, wie Botnetze im Browser funktionieren verglichen mit „herkömmlichen“ Botnetzen und wie sie eine Gefahr für das Internet darstellen,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_____10650::a9225a7a5b9ef879183032004e34dd4c
Autor:
Moinak Bhattacharya, V.Bhattacharya.
Over the past few decades, botnets are known to be a serious threat to the cyber security. The botnets are the systems in a particular network environment that are commanded by the attacker also known as Bot herder through C & C channel and hence tar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7e4cc216eba7b729f4026c664ef36716
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030209506
CSCML
CSCML
A bot-net is a network of infected hosts (bots) that works independently under the control of a Botmaster (Bot herder), which issues commands to bots using command and control (C&C) servers. Bot-net architectures have advanced over time, to evade det
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8763bfdfe2e757437918be828945ba2f
https://doi.org/10.1007/978-3-030-20951-3_24
https://doi.org/10.1007/978-3-030-20951-3_24
Publikováno v:
Alexandria Engineering Journal, Vol 55, Iss 3, Pp 2771-2781 (2016)
Bots are malicious software entities that unobtrusively infect machines and silently engage in activities ranging from data stealing to cyber warfare. Most recent bot detection methods rely on regularity of bot command and control (C&C) traffic for b
Autor:
Gu-Hsin Lai, Chia-Mei Chen
Publikováno v:
Security with Intelligent Computing and Big-data Services ISBN: 9783319764504
Botnets can cause significant security threat and huge loss to organizations, and are difficult to discover their existence; therefore they have become one of the most severe threats on the Internet. The core component of botnets is their command and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::46ef01a2ae7842165aa08c5a7e4a5171
https://doi.org/10.1007/978-3-319-76451-1_27
https://doi.org/10.1007/978-3-319-76451-1_27
Autor:
Takashi Yamanoue
Publikováno v:
SIGUCCS
This paper discusses a method of employing bots instead of people to monitor servers or server rooms. A bot is a remote controlled computer or a remote controlled program. A bot is usually a malicious program which is an element of a botnet. A botnet
Publikováno v:
WWW (Companion Volume)
Unusually high correlation in activities among users in social media is an indicator of bot behavior. We have developed a system, called DeBot, that identifies such bots in Twitter network. Our system reports and archives thousands of bot accounts ev
Autor:
Nailah Mims
Automated programs that covertly infect vulnerable computers and turn them into hosts for unauthorized networks are called bots. These infected hosts are configured to report back to a central system(s) run by an attacker, or bot-herder, and collecti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7d121f6ea400b612438b235567a80608
https://doi.org/10.1016/b978-0-12-803843-7.00014-4
https://doi.org/10.1016/b978-0-12-803843-7.00014-4
Publikováno v:
IOSR Journal of Computer Engineering. 16:87-93
In this paper we aim to use the power of Social Engineering to bypass Keystroke Recognition based authentication system. We have designed a virtual chat system (basically a chat bot), coded in Python, which performs the much needed social engineering
Publikováno v:
International Journal of Hybrid Information Technology. 6:291-300
Botnet has become the most serious security threats on the current Internet infrastructure. Botnet is a group of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command and Control (C&C) infrast