[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Fu et al., 2015 - Google Patents

Analysis of botnet counter-counter-measures

Fu et al., 2015

Document ID
17140661926524143677
Author
Fu Y
Husain B
Brooks R
Publication year
Publication venue
Proceedings of the 10th annual cyber and information security research conference

External Links

Snippet

Botnets evolve quickly to outwit police and security researchers. Since they first appeared in 1993, there have been significant botnet countermeasures. Unfortunately, countermeasures, especially takedown operations, are not particularly effective. They destroy research …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Aurangzeb et al. Ransomware: a survey and trends
Etaher et al. From zeus to zitmo: Trends in banking malware
Huang et al. Using one-time passwords to prevent password phishing attacks
Khan et al. Survey on mobile user's data privacy threats and defense mechanisms
Eian et al. Cyber attacks in the era of covid-19 and possible solution domains
Yoo et al. Case study of the vulnerability of OTP implemented in internet banking systems of South Korea
Ibarra et al. Ransomware impact to SCADA systems and its scope to critical infrastructure
Singh et al. Security attacks taxonomy on bring your own devices (BYOD) model
Ahmed et al. Survey of Keylogger technologies
Fu et al. Analysis of botnet counter-counter-measures
Afaq et al. A critical analysis of cyber threats and their global impact
Adăscăliţei Smartphones and IoT security
Hyun et al. Design and Analysis of Push Notification‐Based Malware on Android
Abdullah et al. A new taxonomy of mobile banking threats, attacks and user vulnerabilities
Gounder et al. New ways to fight malware
Birleanu et al. Malicious and deliberate attacks and power system resiliency
Särökaari Phishing attacks and mitigation tactics
Tidke et al. Detection and prevention of Android malware thru permission analysis
Datta Cybersecurity threats: Malware in the code
Prabith et al. Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies
Singh et al. A survey on Malware, Botnets and their detection
Vo et al. Protecting web 2.0 services from botnet exploitations
Ikhalia A new social media security model (SMSM)
Leung Cyber security risks and mitigation for SME
Bartłomiejczyk et al. Analysis of attacks on SMS OTP-based authentication process