A survey and taxonomy of DoS attacks in cloud computing

M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …

[PDF][PDF] A wide scale survey on botnet

AK Tyagi, G Aghila - International Journal of Computer …, 2011 - researchgate.net
Among the diverse forms of malware, Botnet is the serious threat which occurs commonly in
today‟ s cyber attacks and cyber crimes. Botnet are designed to perform predefined …

Avoiding honeypot detection in peer-to-peer botnets

MM Al-Hakbani, MH Dahshan - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
A botnet is group of compromised computers that are controlled by a botmaster, who uses
them to perform illegal activities. Centralized and P2P (Peer-to-Peer) botnets are the most …

Advance persistent threat: Botnet

B Thakar, C Parekh - … of the Second International Conference on …, 2016 - dl.acm.org
Growth of internet era and corporate sector dealings communication online has introduced
crucial security challenges in cyber space. Statistics of recent large scale attacks defined …

[PDF][PDF] A Framework and demo for preventing anti-computer forensics

C Simmons, D Jones… - Issues in Information …, 2011 - pdfs.semanticscholar.org
Computer forensics has been researched extensively within industry and academia. Anti-
computer forensics conceals and deletes computer data. Currently, organizations rely on …

C&C Techniques in Botnet Development

F Brezo, JG De La Puerta, I Santos, D Barroso… - … Joint Conference CISIS' …, 2013 - Springer
Botnets are one of the most important threats towards nowadays users of the Internet. The
joint of malware capabilities to be exploited in the network services and the increasing …

[HTML][HTML] P2P Botnet Prevention With The Help of Sybil Attack

SM Mane, AS Joshi, VV Bhanawase - Asian Journal For Convergence …, 2016 - asianssr.org
“Botnet” is a network of computers that are compromised and controlled by an attacker.
Botnets are one of the most serious threats to today's Internet. Most current botnets have …

[PDF][PDF] Enhanced P2P Botnets Detection Framework Architecture with Hybrid Analysis Approach.

RS Abdullah, MA Faizal, M Noh, Z Azri - Journal of Information …, 2014 - mirlabs.net
Nowadays, botnets are the most advanced cybercrime as being powerful threaten to the
internet infrastructure by risking the Internet stability and security. Millions of computers have …

[引用][C] 分析網域名稱系統記錄資料以偵測潛在惡意網站之研究

林皓翔 - 2022

[引用][C] Study of P2P botnet

A Joshi, MS Chaudhary - IOSR J. Comput. Eng, 2014