Botnets

Results: 408



#Item
1Computer network security / Computing / Multi-agent systems / Spamming / Cybercrime / Cyberwarfare / Malware / Botnet / Intrusion detection system

A Study of Botnets: Systemization of Knowledge and Correlation-based Detection By Shehar Bano

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:18
2Computing / Cyberwarfare / Software / Cybercrime / Botnets / Denial-of-service attacks / Linux malware / Cryptographic software / Secure Shell / Xor DDoS / OpenSSH / File Transfer Protocol

Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets Christophe Tafani-Dereeper @christophetd

Add to Reading List

Source URL: grehack.fr

Language: English - Date: 2017-11-19 15:28:31
3

Measuring Botnets in the Wild: Some New Trends Wentao Chang1 1 Aziz Mohaisen2

Add to Reading List

Source URL: www.cs.ucf.edu

Language: English - Date: 2017-08-24 12:04:21
    4

    2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis An Wang George Mason University

    Add to Reading List

    Source URL: www.cs.ucf.edu

    Language: English - Date: 2017-08-24 12:04:22
      5

      A Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats

      Add to Reading List

      Source URL: www.commerce.gov

      Language: English - Date: 2018-05-30 11:23:43
        6

        On Botnets that use DNS for Command and Control Christian J. Dietrich†‡ , Christian Rossow∗‡ , Felix C. Freiling† , Herbert Bos∗ , Maarten van Steen∗ and Norbert Pohlmann‡ ∗

        Add to Reading List

        Source URL: www.few.vu.nl

        Language: English - Date: 2011-08-19 05:52:52
          7

          2013 IEEE Symposium on Security and Privacy SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets Christian Rossow∗‡ , Dennis Andriesse‡ , Tillmann Werner¶ , Brett Stone-Gross† , Danie

          Add to Reading List

          Source URL: oaklandsok.github.io

          Language: English - Date: 2018-03-14 15:33:55
            8Cryptocurrencies / Bitcoin / Computing / Concurrent computing / Economy / Blockchains / Computer network security / Spamming / Botnet / RootStock / Counterparty / Proof of Existence

            ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao Newcastle University, UK {taha.ali,patrick.mccorry,peter.lee,feng.hao}@ncl.ac.uk

            Add to Reading List

            Source URL: homepages.cs.ncl.ac.uk

            Language: English - Date: 2015-01-09 18:04:18
            9

            ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao Newcastle University, UK {taha.ali,patrick.mccorry,peter.lee,feng.hao}@ncl.ac.uk

            Add to Reading List

            Source URL: fc15.ifca.ai

            Language: English - Date: 2015-01-28 11:02:41
              10

              White Paper Botnets: The New Threat Landscape Introduction A botnet is an army of compromised machines, also known as “zombies,” that are under the command and control of a single “botmaster.” The rise of consum

              Add to Reading List

              Source URL: www.webtorials.com

              - Date: 2008-01-21 13:13:29
                UPDATE