Fu et al., 2015 - Google Patents
Analysis of botnet counter-counter-measuresFu et al., 2015
- Document ID
- 17140661926524143677
- Author
- Fu Y
- Husain B
- Brooks R
- Publication year
- Publication venue
- Proceedings of the 10th annual cyber and information security research conference
External Links
Snippet
Botnets evolve quickly to outwit police and security researchers. Since they first appeared in 1993, there have been significant botnet countermeasures. Unfortunately, countermeasures, especially takedown operations, are not particularly effective. They destroy research …
- 238000006243 chemical reaction 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aurangzeb et al. | Ransomware: a survey and trends | |
Etaher et al. | From zeus to zitmo: Trends in banking malware | |
Huang et al. | Using one-time passwords to prevent password phishing attacks | |
Khan et al. | Survey on mobile user's data privacy threats and defense mechanisms | |
Eian et al. | Cyber attacks in the era of covid-19 and possible solution domains | |
Yoo et al. | Case study of the vulnerability of OTP implemented in internet banking systems of South Korea | |
Ibarra et al. | Ransomware impact to SCADA systems and its scope to critical infrastructure | |
Singh et al. | Security attacks taxonomy on bring your own devices (BYOD) model | |
Ahmed et al. | Survey of Keylogger technologies | |
Fu et al. | Analysis of botnet counter-counter-measures | |
Afaq et al. | A critical analysis of cyber threats and their global impact | |
Adăscăliţei | Smartphones and IoT security | |
Hyun et al. | Design and Analysis of Push Notification‐Based Malware on Android | |
Abdullah et al. | A new taxonomy of mobile banking threats, attacks and user vulnerabilities | |
Gounder et al. | New ways to fight malware | |
Birleanu et al. | Malicious and deliberate attacks and power system resiliency | |
Särökaari | Phishing attacks and mitigation tactics | |
Tidke et al. | Detection and prevention of Android malware thru permission analysis | |
Datta | Cybersecurity threats: Malware in the code | |
Prabith et al. | Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies | |
Singh et al. | A survey on Malware, Botnets and their detection | |
Vo et al. | Protecting web 2.0 services from botnet exploitations | |
Ikhalia | A new social media security model (SMSM) | |
Leung | Cyber security risks and mitigation for SME | |
Bartłomiejczyk et al. | Analysis of attacks on SMS OTP-based authentication process |