A survey and taxonomy of DoS attacks in cloud computing
M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …
[PDF][PDF] A wide scale survey on botnet
Among the diverse forms of malware, Botnet is the serious threat which occurs commonly in
today‟ s cyber attacks and cyber crimes. Botnet are designed to perform predefined …
today‟ s cyber attacks and cyber crimes. Botnet are designed to perform predefined …
Avoiding honeypot detection in peer-to-peer botnets
MM Al-Hakbani, MH Dahshan - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
A botnet is group of compromised computers that are controlled by a botmaster, who uses
them to perform illegal activities. Centralized and P2P (Peer-to-Peer) botnets are the most …
them to perform illegal activities. Centralized and P2P (Peer-to-Peer) botnets are the most …
Advance persistent threat: Botnet
B Thakar, C Parekh - … of the Second International Conference on …, 2016 - dl.acm.org
Growth of internet era and corporate sector dealings communication online has introduced
crucial security challenges in cyber space. Statistics of recent large scale attacks defined …
crucial security challenges in cyber space. Statistics of recent large scale attacks defined …
[PDF][PDF] A Framework and demo for preventing anti-computer forensics
C Simmons, D Jones… - Issues in Information …, 2011 - pdfs.semanticscholar.org
Computer forensics has been researched extensively within industry and academia. Anti-
computer forensics conceals and deletes computer data. Currently, organizations rely on …
computer forensics conceals and deletes computer data. Currently, organizations rely on …
C&C Techniques in Botnet Development
Botnets are one of the most important threats towards nowadays users of the Internet. The
joint of malware capabilities to be exploited in the network services and the increasing …
joint of malware capabilities to be exploited in the network services and the increasing …
[HTML][HTML] P2P Botnet Prevention With The Help of Sybil Attack
SM Mane, AS Joshi, VV Bhanawase - Asian Journal For Convergence …, 2016 - asianssr.org
“Botnet” is a network of computers that are compromised and controlled by an attacker.
Botnets are one of the most serious threats to today's Internet. Most current botnets have …
Botnets are one of the most serious threats to today's Internet. Most current botnets have …
[PDF][PDF] Enhanced P2P Botnets Detection Framework Architecture with Hybrid Analysis Approach.
Nowadays, botnets are the most advanced cybercrime as being powerful threaten to the
internet infrastructure by risking the Internet stability and security. Millions of computers have …
internet infrastructure by risking the Internet stability and security. Millions of computers have …