메뉴 건너뛰기




Volumn 1, Issue , 2009, Pages 564-568

Botnet command and control mechanisms

Author keywords

Bot; Botnet; Centralized; Decentralized; P2P

Indexed keywords

BOTNETS; COMMAND AND CONTROL; CRITICAL COMPONENT; CYBER-ATTACKS; DISTRIBUTED DENIAL OF SERVICE ATTACK; MALICIOUS ACTIVITIES; NETWORK ASSETS;

EID: 77950505862     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCEE.2009.151     Document Type: Conference Paper
Times cited : (58)

References (26)
  • 6
    • 77950515278 scopus 로고    scopus 로고
    • Web publication, Available at
    • Crimeware:Bots. Web publication, Available at URL: http://www.symantec. com/norton/cybercrime/bots.jsp
  • 20
    • 78649306695 scopus 로고    scopus 로고
    • Web publication. Available at
    • J. Stewart. Sinit P2P trojan analysis. Web publication. Available at URL: http://www.secureworks.com/research/threats/sinit,2003
    • Sinit P2P Trojan Analysis
    • Stewart, J.1
  • 21
    • 70249138620 scopus 로고    scopus 로고
    • Web publication. Available at
    • J. Stewart. Phatbot trojan analysis. Web publication. Available at URL: http://www.secureworks.com/research/threats/phatbot/,2004
    • Phatbot Trojan Analysis
    • Stewart, J.1
  • 23
    • 49049118991 scopus 로고    scopus 로고
    • October
    • SecureWorks. SpamThru trojan analysis, October 2006. http://www. secureworks.com/analysis/spamthru/
    • (2006) SpamThru Trojan Analysis


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.