Based on A novel key management construct P2P Botnet
碩士 === 國立雲林科技大學 === 資訊管理系碩士班 === 97 === In the recently many years, Internet malware attack have become better organized and more profitable. Email spam, extortion by denial-of-attack, and click fraud represent something of this emerging trend. “Botnet” is the main cause of these problems, many atta...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/28169121560419305357 |
id |
ndltd-TW-097YUNT5396071 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097YUNT53960712016-04-29T04:19:02Z http://ndltd.ncl.edu.tw/handle/28169121560419305357 Based on A novel key management construct P2P Botnet 基於新的金鑰管理建構P2PBotnet Wun-Huei Su 蘇文輝 碩士 國立雲林科技大學 資訊管理系碩士班 97 In the recently many years, Internet malware attack have become better organized and more profitable. Email spam, extortion by denial-of-attack, and click fraud represent something of this emerging trend. “Botnet” is the main cause of these problems, many attackers use it to do these malware attacks. Because botnet-based attacks become popular and dangerous, security researchers have studied how to detect, monitor and defend against them. Most of the present research has focused on the C&C Botnets that have first occurred in the past, especially the Internet Relay Chat (IRC) based Botnet. It’s necessary to conduct such research so as to deal with the threat we are facing today. However, it’s important to research on the advanced Botnet that be designed by the attacker in the near future – P2P Botnet for example. Otherwise, we will remain susceptible to the future internet malware attacks. In addition to the malicious attacks of the P2P malware, some academics have suggested to P2P friendly Botnet against distributed denial of service attacks (Distributed Denial of Service, DDoS) of the malicious Botnet. Therefore the development of friendly Botnet is one of the ways to resist the current network of malicious programs attack. We import a new key management in the field of benign Botnet to research into whether it is worth exploring in the future. Tung-Ming Koo 古東明 2009 學位論文 ; thesis 55 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立雲林科技大學 === 資訊管理系碩士班 === 97 === In the recently many years, Internet malware attack have become better organized and more profitable. Email spam, extortion by denial-of-attack, and click fraud represent something of this emerging trend. “Botnet” is the main cause of these problems, many attackers use it to do these malware attacks.
Because botnet-based attacks become popular and dangerous, security researchers have studied how to detect, monitor and defend against them. Most of the present research has focused on the C&C Botnets that have first occurred in the past, especially the Internet Relay Chat (IRC) based Botnet. It’s necessary to conduct such research so as to deal with the threat we are facing today. However, it’s important to research on the advanced Botnet that be designed by the attacker in the near future – P2P Botnet for example. Otherwise, we will remain susceptible to the future internet malware attacks.
In addition to the malicious attacks of the P2P malware, some academics have suggested to P2P friendly Botnet against distributed denial of service attacks (Distributed Denial of Service, DDoS) of the malicious Botnet. Therefore the development of friendly Botnet is one of the ways to resist the current network of malicious programs attack. We import a new key management in the field of benign Botnet to research into whether it is worth exploring in the future.
|
author2 |
Tung-Ming Koo |
author_facet |
Tung-Ming Koo Wun-Huei Su 蘇文輝 |
author |
Wun-Huei Su 蘇文輝 |
spellingShingle |
Wun-Huei Su 蘇文輝 Based on A novel key management construct P2P Botnet |
author_sort |
Wun-Huei Su |
title |
Based on A novel key management construct P2P Botnet |
title_short |
Based on A novel key management construct P2P Botnet |
title_full |
Based on A novel key management construct P2P Botnet |
title_fullStr |
Based on A novel key management construct P2P Botnet |
title_full_unstemmed |
Based on A novel key management construct P2P Botnet |
title_sort |
based on a novel key management construct p2p botnet |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/28169121560419305357 |
work_keys_str_mv |
AT wunhueisu basedonanovelkeymanagementconstructp2pbotnet AT sūwénhuī basedonanovelkeymanagementconstructp2pbotnet AT wunhueisu jīyúxīndejīnyàoguǎnlǐjiàngòup2pbotnet AT sūwénhuī jīyúxīndejīnyàoguǎnlǐjiàngòup2pbotnet |
_version_ |
1718251251498483712 |