Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  botnet detection
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
There are a lot of botnets implementations which are using different kind of communication protocols such as P2P, HTTP, IRC. There are also a lot of methods of their detection which are in most cases useless against botnets that are using novel communication protocols. In nowadays, one can observe increasing number of Internet threats that are using new kind of communication methods for receiving and sending commands between infected host and botmaster. The aim of this paper is to present a concept of detection method for botnets that are using social networks for communication with Command & Control.
PL
Obecnie istnieje wiele implementacji botnetów różniących się przede wszystkim wykorzystywanym protokołem komunikacji, np.: P2P, HTTP, IRC. W związku z powyższym powstały liczne metody ich wykrywania. Niestety znaczna ich część jest nieskuteczna wobec zagrożeń wykorzystujących nowatorskie metody komunikacji. Celem niniejszego artykułu jest zaprezentowanie metody pozwalającej na wykrycie botnetów, które wykorzystują sieci społecznościowe na zarządzania farmami zainfekowanych komputerów.
2
Content available remote A Framework on botnet detection and forensics
EN
The utilization of Internet on domestic and corporate front has been increasing at drastic rate. Each organization and enterprise exploits the internet to its fullest extent based on its requirements. In almost all areas, internet is proved to be a boon. But sometimes it lands the users into trouble because of unwanted and uninvited harmful software applications. There are so many types of threats and challenges that are faced by the internet users. Out of all the threats faced by internet users, botnets are at the top most position. Because of these prodigious threats botnets are the rising area of research. Botnet works as a coordinated or synchronized activity where different bots collectively participate to perform a malicious task. The botnet is different from other form of malware in its capability to compromise the computer systems or smartphones to set up a link with command and control(C\&C) server controlled by bot controller. Because of the massive participation of compromised machines the losses caused by botnet attack are immeasurable. As a result, different researchers are showing keen interest in the field of botnets. The trend reflects that the number of researches in this field have gone up at tremendous rate in past 5 to 10 years. The present paper proposes a framework to systematically identify the presence of malicious bot, prevent it from spreading further and performing its forensic investigation.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.