30   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Xuan Dau Hoang and Quynh Chi Nguyen    
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xuan Dau Hoang and Quynh Chi Nguyen    
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tolijan Trajanovski and Ning Zhang    
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT b... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jun Park and Youngho Cho    
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Jaewoo Jeon and Youngho Cho    
Once a botnet is constructed over the network, a bot master and bots start communicating by periodically exchanging messages, which is known as botnet C&C communication, in order to send botnet commands to bots, collect critical information stored in... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yesta Medya Mahardhika, Amang Sudarsono, Ali Ridho Barakbah     Pág. 1 - 21
Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data. Botnets can replicate themselves without user co... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Shayan Taheri, Milad Salem and Jiann-Shiun Yuan    
The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber criminals ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele and ?Shade Kuyoro    
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt t... ver más
Revista: Information    Formato: Electrónico

 
en línea
Dimitrios Myridakis, Paul Myridakis and Athanasios Kakarountas    
Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Majda Wazzan, Daniyal Algazzawi, Omaima Bamasaq, Aiiad Albeshri and Li Cheng    
Internet of Things (IoT) is promising technology that brings tremendous benefits if used optimally. At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices. IoT botnets, for instance, have becom... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Christopher D. McDermott, John P. Isaacs and Andrei V. Petrovski    
The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led to the production of swathes of insecure Internet-connected devices. Many can be exploited and leveraged to perform large-scale attacks on the Internet, ... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz and Mamoun Alazab    
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xingguo Li, Junfeng Wang and Xiaosong Zhang    
With the help of botnets, intruders can implement a remote control on infected machines and perform various malicious actions. Domain Name System (DNS) is very famous for botnets to locate command and control (C and C) servers, which enormously strengthe... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Vaclav Oujezsky,Tomas Horvath,Vladislav Skorpil     Pág. 38 - 44
This paper addresses the issue of detecting unwanted traffic in data networks, namely the detection of botnet networks. In this paper, we focused on a time behavioral analysis, more specifically said ? lifespans of a simulated botnet netwo... ver más

 
en línea
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin    
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam    
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ashish Koirala, Rabindra Bista and Joao C. Ferreira    
The Internet of Things (IoT) shares the idea of an autonomous system responsible for transforming physical computational devices into smart ones. Contrarily, storing and operating information and maintaining its confidentiality and security is a concerni... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Khalid Al-Begain, Murad Khan, Basil Alothman, Chibli Joumaa and Ebrahim Alrashed    
The Internet of Things (IoT) has become an integral part of our daily life as it is growing in many fields, such as engineering, e-health, smart homes, smart buildings, agriculture, weather forecasting, etc. However, the growing number of IoT devices and... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nejood Faisal Abdulsattar, Firas Abedi, Hayder M. A. Ghanimi, Sachin Kumar, Ali Hashim Abbas, Ali S. Abosinnee, Ahmed Alkhayyat, Mustafa Hamid Hassan and Fatima Hashim Abbas    
Flying ad hoc networks (FANETs) or drone technologies have attracted great focus recently because of their crucial implementations. Hence, diverse research has been performed on establishing FANET implementations in disparate disciplines. Indeed, civil a... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang and Nicola Dragoni    
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-servic... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »