Botnets

Results: 408



#Item
1A Study of Botnets: Systemization of Knowledge and Correlation-based Detection By Shehar Bano

A Study of Botnets: Systemization of Knowledge and Correlation-based Detection By Shehar Bano

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:18
2Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets Christophe Tafani-Dereeper @christophetd

Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets Christophe Tafani-Dereeper @christophetd

Add to Reading List

Source URL: grehack.fr

Language: English - Date: 2017-11-19 15:28:31
3Measuring Botnets in the Wild: Some New Trends Wentao Chang1 1 Aziz Mohaisen2

Measuring Botnets in the Wild: Some New Trends Wentao Chang1 1 Aziz Mohaisen2

Add to Reading List

Source URL: www.cs.ucf.edu

Language: English - Date: 2017-08-24 12:04:21
    42015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks  Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis An Wang George Mason University

    2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis An Wang George Mason University

    Add to Reading List

    Source URL: www.cs.ucf.edu

    Language: English - Date: 2017-08-24 12:04:22
      5A Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats

      A Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats

      Add to Reading List

      Source URL: www.commerce.gov

      Language: English - Date: 2018-05-30 11:23:43
        6On Botnets that use DNS for Command and Control Christian J. Dietrich†‡ , Christian Rossow∗‡ , Felix C. Freiling† , Herbert Bos∗ , Maarten van Steen∗ and Norbert Pohlmann‡ ∗

        On Botnets that use DNS for Command and Control Christian J. Dietrich†‡ , Christian Rossow∗‡ , Felix C. Freiling† , Herbert Bos∗ , Maarten van Steen∗ and Norbert Pohlmann‡ ∗

        Add to Reading List

        Source URL: www.few.vu.nl

        Language: English - Date: 2011-08-19 05:52:52
          72013 IEEE Symposium on Security and Privacy  SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets Christian Rossow∗‡ , Dennis Andriesse‡ , Tillmann Werner¶ , Brett Stone-Gross† , Danie

          2013 IEEE Symposium on Security and Privacy SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets Christian Rossow∗‡ , Dennis Andriesse‡ , Tillmann Werner¶ , Brett Stone-Gross† , Danie

          Add to Reading List

          Source URL: oaklandsok.github.io

          Language: English - Date: 2018-03-14 15:33:55
            8ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao Newcastle University, UK {taha.ali,patrick.mccorry,peter.lee,feng.hao}@ncl.ac.uk

            ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao Newcastle University, UK {taha.ali,patrick.mccorry,peter.lee,feng.hao}@ncl.ac.uk

            Add to Reading List

            Source URL: homepages.cs.ncl.ac.uk

            Language: English - Date: 2015-01-09 18:04:18
            9ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao Newcastle University, UK {taha.ali,patrick.mccorry,peter.lee,feng.hao}@ncl.ac.uk

            ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao Newcastle University, UK {taha.ali,patrick.mccorry,peter.lee,feng.hao}@ncl.ac.uk

            Add to Reading List

            Source URL: fc15.ifca.ai

            Language: English - Date: 2015-01-28 11:02:41
              10White Paper  Botnets: The New Threat Landscape Introduction A botnet is an army of compromised machines, also known as “zombies,” that are under the command and control of a single “botmaster.” The rise of consum

              White Paper Botnets: The New Threat Landscape Introduction A botnet is an army of compromised machines, also known as “zombies,” that are under the command and control of a single “botmaster.” The rise of consum

              Add to Reading List

              Source URL: www.webtorials.com

              - Date: 2008-01-21 13:13:29