Fast Deployment of Botnet Detection Based on Traffic Monitoring
碩士 === 高雄師範大學 === 資訊教育研究所 === 98 === With the Internet crime growing, such as phishing, money mules, personal data stealing and trafficking, DDoS, and other cases often heard by people from time to time. DDoS mostly uses Botnet as source of attack, and distributes trojans and worms to infect hosts....
Main Authors: | Kuang-Li Ting, 丁光立 |
---|---|
Other Authors: | Chung-Huang Yang |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/91599875020295065477 |
Similar Items
-
Botnet Detection and Collapse based on Traffic Analysis
by: Tian-Hao Chen, et al.
Published: (2009) -
Detection of HTTP Botnet Based on Network Traffic
by: Kompakorn Wongwilatnurak, et al.
Published: (2016) -
Fast-Flux Botnet Detection Based on Traffic Response and Search Engines Credit Worthiness
by: Vlado Sruk, et al.
Published: (2018-01-01) -
Detecting Centralized Botnets based on Anomaly Traffic Behaviors
by: Hsiao-Chung Lin, et al.
Published: (2013) -
Botnet anomaly detection by Gateway traffic log
by: Liu, Dai-Kuei, et al.
Published: (2018)