Limpar
8 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Wanting Li, Jian Jin, Jong‐Hyouk Lee,

... typical one. In this paper, the activities of Rustock botnet domain names which just use the fast- ... aspects. Besides, we extract 32 special features of Rustock domain named querying traffic. Then multiple popular classifiers ...

Tópico(s): Advanced Malware Detection Techniques

2019 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo

Janine S. Hiller,

... C. Default Judgment III. MICROSOFT TAKEDOWNS EVOLVE A. Rustock B. Kelihos C. Zeus D. Nitol E. Bamital ...

Tópico(s): Cybersecurity and Cyber Warfare Studies

2014 - Routledge | Santa Clara computer and high-technology law journal

Artigo Revisado por pares

Somayeh Soltani, Seyed Amin Hosseini Seno, Maryam Nezhadkamali, Rahmat Budiarto,

... several real world botnets, i.e. Conficker, Kraken, Rustock, Storm, TDL4, Torpig, Waledac, Zeus and P2P Zeus. ...

Tópico(s): Advanced Malware Detection Techniques

2014 - Institute of Advanced Engineering and Science (IAES) | International Journal of Information and Network Security (IJINS)

Artigo Revisado por pares

Olivier Thonnard, Pierre‐Antoine Vervier, Marc Daciér,

... ii) we look at the impact of the Rustock takedown on the botnet ecosystem; and (iii) we ... that exist among different botnet families (such as Rustock/Grum or Lethic/Maazben ). Regarding the disruption of Rustock on 17 March 2011, our experimental results provide ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2012 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Revisado por pares

Jinpeng Wei, Calton Pu,

... been used by advanced malware such as the Rustock spam bot to achieve malicious goals. In this ...

Tópico(s): Distributed systems and fault tolerance

2011 - Elsevier BV | Computers & Security

Artigo Acesso aberto

Kyungroul Lee, Kangbin Yim,

... hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a ...

Tópico(s): Medical Research and Treatments

2012 - | The Journal of Advanced Navigation Technology

Artigo Revisado por pares

... US, the firm was able to take the Rustock botnet offline.

Tópico(s): Network Security and Intrusion Detection

2011 - Elsevier BV | Computer Fraud & Security

Artigo

Vaibhav Garg, Shaunak Dabadghao,

... used to takedown the C&C servers, of Rustock for example, can be used towards alternative solutions. ...

Tópico(s): Information and Cyber Security

2013 - RELX Group (Netherlands) | SSRN Electronic Journal