Back to Results
First PageMeta Content
Denial-of-service attacks / Cyberwarfare / Multi-agent systems / Computer security / Botnet / Denial-of-service attack / Malware / IP address spoofing / Honeypot / Computer network security / Computing / Spamming


Aachen Department of Computer Science Technical Report Botnet Tracking: Exploring a Root-Cause Methodology to Prevent
Add to Reading List

Document Date: 2006-04-03 08:20:52


Open Document

File Size: 294,92 KB

Share Result on Facebook

City

Aachen / /

Company

Georg Wicherski Laboratory / /

Event

Product Issues / /

Facility

TCP port / RWTH Aachen University / /

IndustryTerm

mobile communication systems / remote networks / control network / remote control network / victim network / Internet hosts / e-commerce / Internet protocol TCP / Internet Relay Chat / botnet infrastructure / web spidering attacks / honeypot technology / search queries / remote control networks / target systems / Internet connection / Internet crime / internal network / /

NaturalFeature

mount DDoS / mount DoS / /

OperatingSystem

DoS / Windows XP / Windows 2000 / /

Organization

Aachen Department of Computer Science Technical Report Botnet Tracking / Department of Computer Science / Aachener Informatik Berichte Department of Computer Science / RWTH Aachen University / /

Person

Thorsten Holz / Felix C. Freiling / /

Position

controller / /

Product

attacker / /

Technology

control network / Higher-level protocols / DNS / honeypot technology / IP / main DDoS technology / http / main DoS technology / UDP / /

URL

http /

SocialTag