The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common commond-and-control (C & C) infrastructure. They are used to distribute commands to the Bots for malicious activities...
BitTorrent seems to be the most popular peer-to-peer (P2P) protocol in file sharing communities. Such communities are exposed to content pollution attacks (i.e., dissemination of corrupted files, viruses or other malware), which require a moderation effort from their administrators. The complexity of such a cumbersome task increases as the publishing rate of the disseminated content grows. A recent...
Botnets have evolved to incorporate peer-to-peer communication for the purpose of better hiding the administrative source of the botnet. Current botnet detection mechanisms identify network traffic patterns at strategic locations within a network such as the gateway. As detection techniques improve, botnet design will continue to evolve to evade detection; thus, it is advantageous to identify potential...
Computer worms evolved continually, faster and smarter. Proactive P2P worms with new "gene" propagate over logical P2P overlay networks defined by peer relationship. Observations suggest that the node degrees of an unstructured P2P network are power law distributed thus we model it as a power law undirected graph. We study propagation process of proactive P2P worm using a dynamic epidemic...
Being a novel P2P system, P2P E-commerce faces all network security issues as ordinary P2P systems do. One of the most severe threats is the imminent worm attacks aiming at P2P systems. Simple definition and taxonomy of P2P worm are presented and characteristics of different types of P2P worm are discussed. The possibility of using P2P system to contain P2P worm is explored, and preliminary countermeasures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.