<--- Back to Details
First PageDocument Content
System software / Software / Denial-of-service attack / Botnet / Internet Relay Chat flood / Ping / LOIC / Universal Plug and Play / Transmission Control Protocol / Denial-of-service attacks / Computing / Computer network security
Date: 2014-12-31 09:35:43
System software
Software
Denial-of-service attack
Botnet
Internet Relay Chat flood
Ping
LOIC
Universal Plug and Play
Transmission Control Protocol
Denial-of-service attacks
Computing
Computer network security

  TLP:  WHITE      

Add to Reading List

Source URL: msisac.cisecurity.org

Download Document from Source Website

File Size: 355,04 KB

Share Document on Facebook

Similar Documents

Computer network security / Computing / Security engineering / Computer security / Cyberwarfare / Cybercrime / Spamming / Multi-agent systems / Botnet / Complex event processing / Zeek / Blacklist

POSTER: BotFlex: A Community-driven Tool for Botnet Detection Sheharbano Khattak Independent Researcher

DocID: 1xW2K - View Document

Botnets / Cybercrime / Computing / Cyberwarfare / Torpig / Srizbi botnet / Festi / Fast flux / Domain generation algorithm / Bot herder / The Spamhaus Project / Conficker

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

DocID: 1xVzK - View Document

Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnet / Influence diagram / Bayesian network / Computer security

Poster: Bottleneck: A Generalized, Flexible, and Extensible Framework for Botnet Defense Naurin Rasheed Ramay∗ , Sheharbano Khattak† , Affan A. Syed‡ Syed Ali Khayam§

DocID: 1xUUW - View Document

Botnets / Cybercrime / Computing / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis⇧ Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi Michalis Kallitsis§ Deepak Kumar†

DocID: 1xUSE - View Document

Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

DocID: 1xUGX - View Document