Botnet

Results: 929



#Item
91Computing / Software / Technology / Cyberwarfare / Social media / Cybercrime / Twitter / Computer network security / Cozy Bear / Hashtag / Computer security / Botnet

v1-04 [преобразованный]

Add to Reading List

Source URL: www2.fireeye.com

Language: English - Date: 2016-03-02 08:11:14
92

Characterizing the Remote Control Behavior of Bots Elizabeth Stinson and John C. Mitchell Department of Computer Science, Stanford University, Stanford, CA 94305 {stinson, mitchell}@cs.stanford.edu Abstract. A botnet is

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2008-08-26 17:57:08
    93Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

    Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

    Add to Reading List

    Source URL: www.casos.cs.cmu.edu

    Language: English
    94

    An Algorithm for Anomaly-based Botnet Detection James R. Binkley Computer Science Dept. Portland State University Portland, OR, USA

    Add to Reading List

    Source URL: web.cecs.pdx.edu

    Language: English - Date: 2006-08-17 12:52:39
      95Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

      BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

      Add to Reading List

      Source URL: faculty.cs.tamu.edu

      Language: English - Date: 2007-05-15 01:33:26
      96

      BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu1,2, Roberto Perdisci3, Junjie Zhang1, and Wenke Lee1

      Add to Reading List

      Source URL: faculty.cs.tamu.edu

      Language: English - Date: 2008-08-04 21:45:35
        97

        Cross-Analysis of Botnet Victims: New Insights and Implications Seungwon Shin, Raymond Lin, and Guofei Gu SUCCESS Lab, Texas A&M University, College Station, Texas, USA {swshin,rlin,guofei}@cse.tamu.edu

        Add to Reading List

        Source URL: faculty.cs.tamu.edu

        Language: English - Date: 2011-06-16 10:26:26
          98

          BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic Guofei Gu, Junjie Zhang, and Wenke Lee College of Computing Georgia Institute of Technology

          Add to Reading List

          Source URL: faculty.cs.tamu.edu

          Language: English - Date: 2008-02-27 16:57:56
            99Computer network security / Software-defined networking / Intrusion detection system / OpenFlow / Botnet / Computer security / Deep packet inspection / Malware / Nox / Flow network

            MalwareMonitor: An SDN-based Framework for Securing Large Networks Zainab Abaid†‡ , Mohsen Rezvani† and Sanjay Jha† ‡ †

            Add to Reading List

            Source URL: conferences2.sigcomm.org

            Language: English - Date: 2014-12-01 17:07:32
            100

            A Taxonomy of Botnet Structures David Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee Georgia Institute of Technology {dagon@cc., guofei@cc., chrislee@, wenke@cc.}gatech.edu Abstract We propose a taxonomy of botnet struc

            Add to Reading List

            Source URL: faculty.cs.tamu.edu

            Language: English - Date: 2007-09-27 18:04:24
              UPDATE