Botnets
3,508 Followers
Recent papers in Botnets
The proliferation of malicious Command and Control (C&C) servers or botnets is a very big security issue in the Internet today. Triggering malware can be found in most known, popular and visited websites. Any user who is tricked in... more
With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal... more
Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be... more
The paper provides an overview of information distortions in social media, purposely created by political and business circles. Mechanisms of fake accounts, social media bots and virtual identities creation are analyzed... more
... potential malware, and the number of such websites has increased by around 190,0000 since 2008 (see Google's Safe Browsing ... We used the Windows command Ipconfig/displaydns to display the contents of the DNS resolver cache... more
The results of botnet detection methods are usually presented without any comparison. Although it is generally accepted that more comparisons with third-party methods may help to improve the area, few papers could do it. Among the factors... more
The study designs an approach that takes advantage of platforms that allows bots to interact with its users using Instant Messaging .The proposed system models a botnet that enables bidirectional flow of communication between the... more
Challenges for detection of botnet for forensic investigation is crucial because new models of botnet using different techniques are emerging everyday by lurking attackers in a deep web. Locating c&c servers of a botnet through usual... more
— The use of Internet and its related services is increasing day by day. Many million people everyday surf net and use it for various reasons. With so much use of internet, the threats related to security are the major concern of today.... more
Este libro nos presenta aspectos legales y técnicos del Internet. Abarca diversos temas que a primera vista parecieran ser para un público especializado, como lo son los abogados e ingenieros, pero la realidad es que siendo el Internet la... more
This article offers a reading of internet-based activism or 'hacktivism' as a phenomenon that cannot be confined to the instrumental use of information technologies. It focuses on a subset of hacktivism – the distributed-denial-of-service... more
To enable more effective mitigation of Android botnets, image-based detection approaches offer great promise. Such image-based or visualization methods provide detection solutions that are less reliant on hand-engineered features which... more
Botnets have evolved to become one of the most serious threats to the Internet and there is substantial research on both botnets and botnet detection techniques. This analysis reviewed the history of botnets and botnet detection... more
Botnets, the groups of illegally controlled infected devices on the Internet have had a history of two decades already. This history shows an evolution of the infection techniques, the scope of the target devices, and their usage. Thus,... more
–The Spam Emails are regularly causing huge losses to business on a regular basis. The Spam filtering is an automated technique to identity SPAM and HAM (Non-Spam). The Web Spam filters can be categorized as: Content based spam filters... more
Malware create a seriously problem to the infected computer. People was believe that installing antivirus can mitigate the computer being infected. Unfortunately, malware designer actively create botnet being hide from the antivirus. In... more
Data mining is an interdisciplinary subfield of computer science involving methods at the intersection of artificial intelligence, machine learning and statistics. One of the data mining tasks is anomaly detection which is the analysis of... more
Abstract — The raised significant evolution of the Internet next to the development of the high prevalence of computers, smart phones and the Internet on a large scale in most of the trends of life, but this use leads to network attacks.... more
Passwords make our lives easier and secure. It protects our valuable private information. So, this acts as a blessing in our life. But every coin has two sides. This blessing can turn into a threat because passwords are being hacked by... more
During the last decade, botnet emerged as one of the most serious malware which possess a serious threat to the Internet. Due to significant research effort in this domain there are many different detection methods based on diverse... more
Cloud forensics has become an inexorable and a transformative discipline in the modern world. The need to share a pool of resources and to extract digital evidence from the same distributed resources to be presented in a... more
martphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from... more
Internet, the largest available tool for information, communication and commerce has resulted in globalisation, while on the other hand; it has resulted in a large number of criminal activities and cybercrimes for financial gains. Botnets... more
—The utilization of Internet on domestic and corporate front has been increasing at drastic rate. Each organization and enterprise exploits the internet to its fullest extent based on its requirements. In almost all areas, internet is... more
With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal... more