Zobrazeno 1 - 10
of 230
pro vyhledávání: '"ZeroAccess botnet"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal of Information Technology. 13:2091-2099
ZeroAccess is a distributed Peer-to-Peer (P2P) botnet used by attackers for various monetary benefits—including click-fraud, bitcoin mining, pay-per-install and information theft. ZeroAccess infected tens of millions of computers. It creates the hi
Autor:
Kerner, Sean Michael
Publikováno v:
eWeek. 12/6/2013, p15-15. 1p.
Autor:
Peckham, Matt
Publikováno v:
Time.com. 12/9/2013, p1-1. 1p. 1 Color Photograph.
Autor:
Panagiotis Kintis, Manos Antonakakis, Michael Farrell, David Dagon, Yizheng Chen, Yacin Nadji
Publikováno v:
Computers & Security. 67:164-180
Online advertising is a complex ecosystem that enables one of the most profitable businesses, which has become the target of abuse for botnets. For example, recent charges filed from the United States Department of Justice against the operators of th
Publikováno v:
Neural Computing and Applications. 28:1541-1558
Botnet is a thorny and a grave problem of today's Internet, resulting in economic damage for organizations and individuals. Botnet is a group of compromised hosts running malicious software program for malicious purposes, known as bots. It is also wo
Publikováno v:
ICC
The ever-growing number of cyber attacks from botnets has made them one of the biggest threats on the Internet. Thus, it is crucial to study and analyze botnets, to take them down. For this, an extensive monitoring is a pre-requisite for preparing a
Autor:
Shankar Karuppayah
Publikováno v:
SpringerBriefs on Cyber Security Systems and Networks ISBN: 9789811090493
This chapter provides an in-depth analysis on the anatomy of three P2P botnets that are focused in this book; GameOver Zeus, Sality and ZeroAccess. This analysis is partly done based on own reverse-engineering work as well as based on the work of oth
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::40c3e725bb79653ba975e00c982ad716
https://doi.org/10.1007/978-981-10-9050-9_3
https://doi.org/10.1007/978-981-10-9050-9_3
Autor:
Shankar Karuppayah
Publikováno v:
SpringerBriefs on Cyber Security Systems and Networks ISBN: 9789811090493
This chapter discusses in-depth on the challenges of monitoring P2P botnets using a sensor as well as the viable solution to circumvent them. Most of the related work have mentioned that sensors are difficult to be detected due to the passive nature
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::94650fccb6c1db1177144ad8b353b602
https://doi.org/10.1007/978-981-10-9050-9_5
https://doi.org/10.1007/978-981-10-9050-9_5
Autor:
Mathias Fischer, Selvakumar Manickam, Tim Grube, Shankar Karuppayah, Max Mühlhäuser, Leon Böck
Publikováno v:
ARES
The ever-growing number of cyber attacks originating from botnets has made them one of the biggest threat to the Internet ecosystem. Especially P2P-based botnets like ZeroAccess and Sality require special attention as they have been proven to be very