Zobrazeno 1 - 10
of 259
pro vyhledávání: '"Srizbi botnet"'
Publikováno v:
Peer-to-Peer Networking and Applications. 11:848-861
Botnets are widespread and have become a major threat to network security. A botnet is a group of infected computers that are controlled by a botmaster. Botnet’s members use command and control (C&C) channels to communicate with their C&C server. I
Autor:
Roshan Mathew
Publikováno v:
International Journal of Computer and Communication Technology. :48-51
A botnet is a network of compromised computers that are infected with code that allows an unauthorized user to control them via the Internet. Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized com
Publikováno v:
Computers & Security. 64:1-15
Botnets are one of the leading threats to network security nowadays and are used to conduct a wide variety of malicious activities, including information theft, phishing, spam mail distribution, and Distributed Denial of Service (DDoS) attacks. Among
Autor:
Alex Kigerl
Publikováno v:
Trends in Organized Crime. 21:62-78
Spam is the sending of bulk, commercial, unsolicited electronic marketing messages. Today email spam makes up the majority of all email sent worldwide. The CAN SPAM Act is U.S. federal legislation that was passed in response to the growing spam probl
Publikováno v:
Security and Communication Networks. 9:3127-3140
Botnet has become a popular technique for deploying Internet crimes. The command of botnet has evolved into a major way for attackers to launch Distributed Denial of Service attacks on network servers. Modelized analysis methods need to be studied fo
Autor:
Khamphao Sisaat, Hiroshi Ishii, Masato Terada, Hiroaki Kikuchi, Surin Kittitornkun, Chaxiong Yukonhiatou
Publikováno v:
International Journal of Information Security. 16:459-473
A huge number of botnet malware variants can be downloaded by zombie personal computers as secondary injections and upgrades according to their botmasters to perform different distributed/coordinated cyber attacks such as phishing, spam e-mail, malic
Autor:
Marcelo H. P. C. Chaves, Elverton Fazzion, Klaus Steding-Jessen, Dorgival Guedes, Cristine Hoepers, Pedro Las-Casas, Italo Cunha, Osvaldo Fonseca, Wagner Meira
Publikováno v:
IEEE Internet Computing. 20:16-24
Spam messages propagate malware, disseminate phishing exploits, and advertise illegal products. Those messages generate costs for users and network operators, but it's difficult to measure the costs associated with spam traffic and determine who actu
Autor:
Wagner Meira, Klaus Steding Jessen, Pedro Henrique B. Las Casas, Marcelo H. P. C. Chaves, Elverton Fazzion, Dorgival Guedes, Cristine Hoepers, Osvaldo Fonseca
Publikováno v:
IEEE Latin America Transactions. 14:2987-2996
In 2012, estimates indicated that 68.8% of all e-mail traffic was spam, what suggests this is still a relevant problem. Recently, some works have focused on the analysis of spam's traffic inside the network, analyzing the protocols used and the AS wh
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 13:236-251
Cyber criminals are covertly attacking critical infrastructures, and botnets are a common component of those attacks. In recent years, botnets have been shifting their focus from broad-based attacks to more targeted ones such as attacking financial i
Publikováno v:
EUSIPCO
In a randomized DDoS attack with increasing emulation dictionary, the bots try to hide their malicious activity by disguising their traffic patterns as "normal" traffic patterns. In this work, we extend the DDoS class introduced in [1], [2] to the ca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4904114569bff845bc88a831f7d738ec