The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
Botnet is recognized as one of the fastest growing threat to the Internet and most users do not aware that they were victimized. ThaiCERT is one of many computer emergency response teams that have limited resources in term of budget to monitor and handle this kind of threat. An interim solution for teams with limited resource is to subscribe to the Shadowserver Foundation's mailing list instead of...
We investigate how an ISP can efficiently detect bots in its subscribers' computers, possibly as a value-added service or to prevent collateral damage to its infrastructure. By causing an ISP's email servers and network links to get clogged or blacklisted, bots reduce the quality of service the ISP provides to its subscribers. We describe DNS Flagger, a novel device for ISP bot detection, and evaluate...
Countermeasures against botnet, which has been recognized as the Internet??s biggest threat, are urgently needed to create a safe Internet environment. However, the current technology lags behind the evolution of botnet, and, unlike in the past, mutual cooperation among ISPs and countries is essential. As botnet is distributed internationally rather than in a particular ISP domain, international cooperation...
The paper discusses the threat of botnets on the Internet. Botnets are group of infected machine across the Internet controlled by one machine acting as a "zombie" (computer).
The collective behavior of network data segments corresponding to port 110 (e-mail) was visualized and analyzed with a set of nonlinear and computational parameters such as: Lyapunov exponent, fractal dimension, recurrence, determinism, grammatical rules, and lempel-Ziv complexity. Common methods for network data analysis are based mainly in descriptive statistics, although useful and widely accepted...
Botnets are emerging threat with hundreds of millions of computers infected. A study shows that about 40% of all computers connected to the internet in the world are infected bots and controlled by attackers. This article is a survey of recent advances in botnet research. The survey classifies the botnet research into three areas: understanding botnets, detecting and tracking botnets, and defending...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.