Back to Results
First PageMeta Content
Multi-agent systems / Botnets / Cyberwarfare / Storm botnet / Mariposa botnet / Cutwail botnet / Denial-of-service attack / Zeus / Malware / Computer network security / Computing / Spamming


WHITE PAPER GLOBAL NETWORK SERVICE PROVIDERS: SECURING A POSITION TO CHALLENGE THE BOTNET SUMMARY Network attackers set out to disrupt, damage or
Add to Reading List

Document Date: 2014-04-23 15:42:47


Open Document

File Size: 2,22 MB

Share Result on Facebook

Company

Service Provider Networks / Level 3 Communications LLC / Threat Intelligence Systems / IOActive Inc / Cisco / Level 3 Communications Inc. / Content Delivery Networks / Domain Name Systems / OECD Publishing / Trend Micro Incorporated / /

Country

Germany / Netherlands / Japan / United States / Australia / /

/

Facility

Michigan State University / /

IndustryTerm

Web Protection Services / Internet Service Providers / intrusive and controversial monitoring technologies / external systems / cooperative network / server networks / Internet services / Internet Relay Chat / questionable external devices / external device / botnet software / software keeps / resilient infrastructure / social media / Internet traffic / external devices / traffic shaping technology / Web Security Report / proper network / takedown infrastructure / Internet today / security software / botnet operator / implemented using this highly resilient infrastructure / /

OperatingSystem

Microsoft Windows / /

Organization

Michigan State University / DDoS Service / Communications / Security / Reliability / and Interoperability Council / U.S. Communications Security / Reliability and Interoperability Council / Organization for Economic Co-operation and Development / Delft University of Technology / OECD / /

Person

Hadi Asgharia / Gunter Ollmann / Morris Worm / David Dittrich / Michel van Eetena / Hadi Asghari / Shirin Tabattabaie / Johannes M. Bauerb / Johannes M Bauer / Shirin Tabatabaiea / Dave Randc / /

/

Position

average security researcher / CTO / researcher / security researcher / /

Product

Managed Security Services / /

Technology

broadband / control network / Peer-to-Peer / P2P / intrusive and controversial monitoring technologies / operating system / operating systems / encryption / Firewall / smartphones / traffic shaping technology / /

URL

http /

SocialTag