<--- Back to Details
First PageDocument Content
Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets
Date: 2014-06-18 01:23:21
Multi-agent systems
Spamming
Cyberwarfare
Malware
Zeus
Zombie
Torpig
Conficker
Denial-of-service attack
Computer network security
Computing
Botnets

Microsoft PowerPoint - botnet_detection2009.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Download Document from Source Website

File Size: 628,32 KB

Share Document on Facebook

Similar Documents

Botnets / Computing / Computer network security / Multi-agent systems / Spamming / Malware / Cyberwarfare / Torpig / Srizbi botnet / Command and control / Festi / Fast flux

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

DocID: 1l2Sv - View Document

Microsoft Word - iDefense_RRT_Torpig_20070703.doc

DocID: 1jMKO - View Document

X86 architecture / UPX / Computing / MOV / Assembly languages / CPUID / Computer architecture / Software / X86 instructions

The Torpig/Anserin/Sinowal family of Trojans detect virtual machine monitors and abort infection when present

DocID: 19NoP - View Document

Multi-agent systems / Spamming / Cyberwarfare / Storm botnet / Storm Worm / Zombie / Waledac botnet / Torpig / Zeus / Computer network security / Computing / Botnets

– Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´

DocID: 17AJO - View Document

Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets

Microsoft PowerPoint - botnet_detection2009.ppt

DocID: 11hlY - View Document