Zobrazeno 1 - 10
of 82
pro vyhledávání: '"ZeroAccess botnet"'
Publikováno v:
International Journal of Information Technology. 13:2091-2099
ZeroAccess is a distributed Peer-to-Peer (P2P) botnet used by attackers for various monetary benefits—including click-fraud, bitcoin mining, pay-per-install and information theft. ZeroAccess infected tens of millions of computers. It creates the hi
Autor:
Panagiotis Kintis, Manos Antonakakis, Michael Farrell, David Dagon, Yizheng Chen, Yacin Nadji
Publikováno v:
Computers & Security. 67:164-180
Online advertising is a complex ecosystem that enables one of the most profitable businesses, which has become the target of abuse for botnets. For example, recent charges filed from the United States Department of Justice against the operators of th
Publikováno v:
Neural Computing and Applications. 28:1541-1558
Botnet is a thorny and a grave problem of today's Internet, resulting in economic damage for organizations and individuals. Botnet is a group of compromised hosts running malicious software program for malicious purposes, known as bots. It is also wo
Autor:
Shankar Karuppayah
Publikováno v:
SpringerBriefs on Cyber Security Systems and Networks ISBN: 9789811090493
This chapter provides an in-depth analysis on the anatomy of three P2P botnets that are focused in this book; GameOver Zeus, Sality and ZeroAccess. This analysis is partly done based on own reverse-engineering work as well as based on the work of oth
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::40c3e725bb79653ba975e00c982ad716
https://doi.org/10.1007/978-981-10-9050-9_3
https://doi.org/10.1007/978-981-10-9050-9_3
Autor:
Shankar Karuppayah
Publikováno v:
SpringerBriefs on Cyber Security Systems and Networks ISBN: 9789811090493
This chapter discusses in-depth on the challenges of monitoring P2P botnets using a sensor as well as the viable solution to circumvent them. Most of the related work have mentioned that sensors are difficult to be detected due to the passive nature
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::94650fccb6c1db1177144ad8b353b602
https://doi.org/10.1007/978-981-10-9050-9_5
https://doi.org/10.1007/978-981-10-9050-9_5
Autor:
Mathias Fischer, Selvakumar Manickam, Tim Grube, Shankar Karuppayah, Max Mühlhäuser, Leon Böck
Publikováno v:
ARES
The ever-growing number of cyber attacks originating from botnets has made them one of the biggest threat to the Internet ecosystem. Especially P2P-based botnets like ZeroAccess and Sality require special attention as they have been proven to be very
Autor:
Joseph DiVita, Roger A. Hallman
Publikováno v:
ARES
Botnet malware, which infects Internet-connected devices and seizes control for a remote botmaster, is a long-standing threat to Internet-connected users and systems. Botnets are used to conduct DDoS attacks, distributed computing (e.g., mining bitco
Publikováno v:
INFOCOM
Network protocol reverse engineering of botnet command and control (C&C) is a challenging task, which requires various manual steps and a significant amount of domain knowledge. Furthermore, most of today's C&C protocols are encrypted, which prevents
Publikováno v:
International Journal of Hybrid Information Technology. 6:291-300
Botnet has become the most serious security threats on the current Internet infrastructure. Botnet is a group of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command and Control (C&C) infrast
Publikováno v:
NTMS
One of the most serious cyber-security threats is the botnet. The botnet runs in the background of the compromised machine and maintains the communication with the C&C server to receive malicious commands. Botnet master uses botnet to launch dangerou