tailieunhanh - Báo cáo hóa học: "Review Article Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures"

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Review Article Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures | Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2009 Article ID 692654 11 pages doi 2009 692654 Review Article Botnet Classification Attacks Detection Tracing and Preventive Measures Jing Liu 1 Yang Xiao 1 Kaveh Ghaboosi 2 Hongmei Deng 3 and Jingyuan Zhang1 department of Computer Science The University of Alabama Tuscaloosa AL 35487-0290 USA 2The Centre for Wireless Communications University of Oulu . Box4500 FI-90014 Finland 3 Intelligent Automation Inc. Rockville MD 20855 USA Correspondence should be addressed to Yang Xiao yangxiao@ Received 25 December 2008 Revised 17 June 2009 Accepted 19 July 2009 Recommended by Yi-Bing Lin Botnets become widespread in wired and wireless networks whereas the relevant research is still in the initial stage. In this paper a survey of botnets is provided. We first discuss fundamental concepts of botnets including formation and exploitation lifecycle and two major kinds of topologies. Several related attacks detection tracing and countermeasures are then introduced followed by recent research work and possible future challenges. Copyright 2009 Jing Liu et al. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. Introduction The untraceable feature of coordinated attacks is just what hackers attackers demand to compromise a computer or a network for their illegal activities. Once a group of hosts at different locations controlled by a malicious individual or organization to initiate an attack one can hardly trace back to the origin due to the complexity of the Internet. For this reason the increase of events and threats against legitimate Internet activities such as information leakage click fraud denial of service DoS and attack E-mail spam etc. has become a very serious problem nowadays 1 . Those victims .

TÀI LIỆU LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.