Botnet

Results: 929



#Item
231Denial-of-service attacks / Spamming / Cyberwarfare / Botnet / Denial-of-service attack / Internet Relay Chat / DoSnet / Storm botnet / Computer network security / Computing / Multi-agent systems

BlackEnergy DDoS Bot Analysis Jose Nazario, Ph.D. Arbor Networks October 2007

Add to Reading List

Source URL: atlas-public.ec2.arbor.net

Language: English - Date: 2007-10-10 14:05:38
232HTTP / Inter-process communication / Server Message Block / URL redirection / DNS spoofing / Shared resource / Man-in-the-middle attack / HTTP Secure / Computing / Network file systems / Computer network security

REDIRECT TO SMB REDIRECT TO SMB A CYLANCE SPEAR TEAM WHITE PAPER Lead Researcher: Brian Wallace // @botnet_hunter

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-04-13 03:55:39
233Spamming / File sharing networks / Concurrent computing / Botnets / Storm botnet / Peer-to-peer / Kad network / Malware / DoSnet / Multi-agent systems / Computer network security / Computing

Botnet detection revisited: Theory and Practice of Finding Malicious P2P Networks via Internet Connection Graphs Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D’Alconzo FTW, Vienna, Austria

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:32:55
234Email / Computer-mediated communication / Computer network security / Spam filtering / Multi-agent systems / Email spam / Botnet / Spam / Malware / Spamming / Computing / Internet

Data Sheet Sendmail IP Reputation Service™ Real-time Classification of Black, White and Grey Traffic OVERVIEW

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2007-06-14 19:56:29
235Email / Computer-mediated communication / Computer network security / Spam filtering / Multi-agent systems / Email spam / Botnet / Spam / Malware / Spamming / Computing / Internet

Data Sheet Sendmail IP Reputation Service™ Real-time Classification of Black, White and Grey Traffic OVERVIEW

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2007-06-14 19:56:29
236Anti-spam techniques / Spam / Email spam / Botnet / Storm botnet / Proxy server / Email filtering / Honeypot / Spam email delivery / Spamming / Computing / Internet

Spamalytics: An Empirical Analysis of Spam Marketing Conversion ∗ †

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-11-06 19:05:01
237Akamai Technologies / Content delivery network / Spamming / Multi-agent systems / Denial-of-service attack / Prolexic Technologies / Botnet / Computer network security / Computing / Internet

    Akamai Security Advisory VERSION: G

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2014-01-09 15:26:01
238Computer network security / Computer security / Antivirus software / Rootkit / Computer virus / Computer worm / Threat / Conficker / Botnet / System software / Malware / Cyberwarfare

Malware Attribute Enumeration and Characterization Ivan Kirillov Penny Chase MITRE Corporation

Add to Reading List

Source URL: maec.mitre.org

Language: English - Date: 2010-10-14 13:37:00
239Computing / Security / Internet protocols / Internet standards / Internet security / Domain Name System Security Extensions / Computer security / Botnet / Canadian Security Intelligence Service / Computer network security / Internet / Domain name system

CSIS Secure DNS Cyber Security Intelligence Services Last Line of Defence The security business is a jungle. What really matter are

Add to Reading List

Source URL: www.csis.dk

Language: English - Date: 2015-01-08 09:04:08
240Mobile technology / Mobile telecommunications / Computer network security / Multi-agent systems / Spamming / Botnet / Malware / SMS / Mobile payment / Technology / Electronic commerce / Computing

Mobile Threats & the Underground Marketplace

Add to Reading List

Source URL: docs.apwg.org

Language: English - Date: 2013-04-24 11:32:04
UPDATE