The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Mirai botnet and its variants and imitators are a wake-up call to the industry to better secure Internet of Things devices or risk exposing the Internet infrastructure to increasingly disruptive distributed denial-of-service attacks.
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically...
With the efficient Internet access and increasing powerful computing capabilities of mobile device, the mobile botnet has becoming an emerging threat in the mobile Internet. In this paper, we propose a novel mobile botnet using the cloud platform consisting with multiple message push servers. The path delay is measured as the metrics to classify bots into different groups. A weighted round-robin algorithm...
Recent malicious attempts in Cyber-space are intended to emerge cyberwar such as stuxnet as well as to get financial benefits by spam, distributed-of-service(DDoS), identity theft, and phishing through a large pool of comprised hosts, which are called zombies. Botnets are becoming one of the most serious threats to Internet security. We consider that major pre-symptoms of cyber threats are activity...
Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the...
Distributed Denial of Service (DDoS) attacks using Botnets became widely used in the Internet because of its efficiency and easy implementation. We will present in this paper a new architecture that stops DDoS attacks based on Botnet C&C (Command & control) and identify the Botmaster (the bots owner) machine.
On open digital computing infrastructure, various large-scale and complicated malicious behaviors are increasingly threatening the security of digital computing infrastructure. In this paper, a Cooperative Work Model (CRM) is presented by extending the conceptions of the Universal Turing Machine to deal with the threats. Then the Cooperative Work System Framework (CWSF) is derived from the model....
This paper describes a new botnet that we have discovered at the beginning of December 2009. Our Net Flow-based network monitoring system reported an increasing amount of Telnet scanning probes. Tracing back to a source we have identified world wide infected DSL modems and home routers. Nowadays, various vendors use Linux in this kind of devices. A further investigation has shown that most of deployed...
Malicious botnet is evolving very quickly and using the many ways to evade detection system. The change of protocol is the most important part of the malicious botnet's evolution and evasion techniques. The initial malicious botnet was using the IRC protocol for communication between the command and contorl server and the zombie system. After that they use the HTTP protocol on the firewall-friendly...
It is widely accepted that botnets pose one of the most significant threats to the Internet. But the size of the botnet continues to be an issue of debate among the research community. We develop new techniques to measure botnet size by using traces of emails from HUST Mail Server. In this trace, we have successfully identied the size of botnets through URL and collaborative mail servers. Our research...
Business organizations and government agencies that depend on an Internet presence but operate without effective DDoS protection mechanisms put their operations at unacceptable risk. Unfortunately, the varieties of DDoS attacks, the incomplete information we have about them, the difficulty of large-scale testing, and the need for a distributed response at many points make defending against DDoS attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.