<--- Back to Details
First PageDocument Content
Computer network security / Cybercrime / Spamming / Internet protocols / Phishing / Social engineering / Botnet / Malware / DNS hijacking / Domain name system / Computing / Internet
Date: 2013-06-24 14:16:28
Computer network security
Cybercrime
Spamming
Internet protocols
Phishing
Social engineering
Botnet
Malware
DNS hijacking
Domain name system
Computing
Internet

Secure64 DNS Guard Data Sheet v2.1.indd

Add to Reading List

Source URL: www.secure64.com

Download Document from Source Website

File Size: 553,59 KB

Share Document on Facebook

Similar Documents

Computer network security / Computing / Security engineering / Computer security / Cyberwarfare / Cybercrime / Spamming / Multi-agent systems / Botnet / Complex event processing / Zeek / Blacklist

POSTER: BotFlex: A Community-driven Tool for Botnet Detection Sheharbano Khattak Independent Researcher

DocID: 1xW2K - View Document

Botnets / Cybercrime / Computing / Cyberwarfare / Torpig / Srizbi botnet / Festi / Fast flux / Domain generation algorithm / Bot herder / The Spamhaus Project / Conficker

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

DocID: 1xVzK - View Document

Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnet / Influence diagram / Bayesian network / Computer security

Poster: Bottleneck: A Generalized, Flexible, and Extensible Framework for Botnet Defense Naurin Rasheed Ramay∗ , Sheharbano Khattak† , Affan A. Syed‡ Syed Ali Khayam§

DocID: 1xUUW - View Document

Botnets / Cybercrime / Computing / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis⇧ Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi Michalis Kallitsis§ Deepak Kumar†

DocID: 1xUSE - View Document

Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

DocID: 1xUGX - View Document