Search


PDF Archive search engine
Last database update: 17 October at 11:24 - Around 76000 files indexed.


Show results per page

Results for «botnet»:


Total: 10 results - 0.03 seconds

Zeus-Crimeware-Toolkit 100%

http://blogs.mcafee.com/mcafee-labs/zeus-crimeware-toolkit The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today.

https://www.pdf-archive.com/2011/03/26/zeus-crimeware-toolkit/

26/03/2011 www.pdf-archive.com

Documentazione SPB Botnet 92%

Botnet Documentazione Ufficiale Funzionalità e utilizzo dell’applicazione In questo testo sarà descritto il funzionamento del software a livello applicativo di “SPB ::

https://www.pdf-archive.com/2017/07/10/documentazione-spb-botnet/

10/07/2017 www.pdf-archive.com

Finish 10 - DoS 8 89%

DoS là dạng tấn công khi hacker sử dụng một máy tính để tiến hành, còn DDoS hay Distribute Denial of Services (tấn công từ chối dịch vụ phân tán) là khi hacker tiến hành tấn công DoS từ nhiều máy tính khác nhau, thông thường là một hệ thống mạng botnet.

https://www.pdf-archive.com/2017/10/08/finish-10-dos-8/

08/10/2017 www.pdf-archive.com

458087 IDC Tech Spotlight New DDoS Defense FINAL 89%

A botnet operator can instruct several botnet agents to make several simultaneous connections, which prevent the addition of more connections to the target Web site.

https://www.pdf-archive.com/2016/01/13/458087-idc-tech-spotlight-new-ddos-defense-final/

13/01/2016 www.pdf-archive.com

CM SECURITY RECOVERY SMS 63%

4/5/2016 4:09:29 PM Damn 4/5/2016 6:44:53 PM R u up 4/5/2016 6:45:54 PM Ya..im going to eat 4/5/2016 6:46:27 PM Ok 4/5/2016 6:46:30 PM Didnt mean to botnet u 4/5/2016 6:46:41 PM Bother 4/5/2016 6:47:06 PM Ill text u later ..ur not a bother 4/5/2016 8:44:51 PM Hi 4/5/2016 8:45:16 PM Hey im with my bf right now 4/5/2016 8:49:08 PM Ok 4/5/2016 8:55:27 PM Sorry 4/5/2016 9:51:10 PM Hows your nite?

https://www.pdf-archive.com/2016/04/09/cm-security-recovery-sms/

09/04/2016 www.pdf-archive.com

hope schedule 61%

the Future of Open Hardware “No Natural Resources Were Hurt Assembling This Sofa” Solving More Than #firstworldproblems SATURDAY 1000 1100 1200 1300 1400 1500 1600 1630 1700 1800 1900 2000 2100 2200 2300 2359 Dennis Sassaman Nutt I’m Not a Real Friend, Occupy the Airwaves But I Play One on the Why Browser Cryptography is Bad Internet Protecting Your Historic Hacks in Advancements in Botnet Attacks Data from the Cops Portable Computing Phone Phreak Practical Insecurity in Hacking Mindsets Confidential Encrypted Radio Keynote:

https://www.pdf-archive.com/2012/07/11/hope-schedule/

11/07/2012 www.pdf-archive.com

Apache HBase建置高效能網路流量分析系統 57%

2014 貳、網路流量分析 網路流量分析與入侵偵測(Intrusion Detection)一直是個相當熱門的研究議題,相 關應用有流量異常偵測[10,15,16,20]、payload 分析[23]、worm 及 malware 散佈偵測[8,17,25] 以及 botnet 偵測[12,14,22,27]等,對於使用網路流量於入侵偵測的研究方法,Sperotto 等 人[21]有一個完整的分析與整理。本文對於網路流量(IP Flow)的定義遵循 IETF(Internet Engineering Task Force)中 IPFIX(IP Flow Information Export)工作小組的定義[7,19]: 網路流量是由一群 IP 封包在一定的時間內通過網路中的一個觀察點所構成,這些網路流 量由一組網路封包中的通用屬性(common properties)所組成。在 IPFIX 的定義中,這 組通用屬性稱之為 flow keys,可表示如下: IPsrc , IPdst , Port src , Portdst , Pr otocol, Packets, Bytes, Timestamp 上述依序為發送端與目的端 IP、發送端與目的端 port、網路協定、封包數量、傳送 bytes 數以及時間戳記。通常每一筆網路流量只會紀錄上述 metadata,而不對任何 payload 做紀 錄。這樣的網路流量紀錄會在路由器上產生,並透過設定將紀錄轉送至流量搜集器(flow collector)。 現今關於網路流量的相關研究,大多著重在入侵偵測的演算法開發與模型發展,然 而,對於攻擊手法不斷推陳出新的資訊安全領域,加以企業被入侵後所付出的高昂代價, 由專業資訊安全分析師對任何可疑活動進行進一步的調查與分析勢必在所難免。除此之 外,在入侵偵測領域中,Behavior-based Model[12]雖然能夠偵測到較多的惡意行為(true positive),卻也容易產生過多的誤報(false positive)[18],因此除了不斷提升演算法的準確 率外,如何支援資訊安全分析師對偵測結果進行分析檢測,在短時間內進行大量歷史資 料的搜索分析,就成為了一個值得關注的議題。 圖一:Behavior-based Model 有較高的 true positive 及 false positive[18] Communications of the CCISA Vol.

https://www.pdf-archive.com/2015/01/13/apache-hbase/

13/01/2015 www.pdf-archive.com

Brazil Cyberwellness Profile 45%

CYBERWELLNESS PROFILE BRAZIL BACKGROUND Total Population:

https://www.pdf-archive.com/2018/01/30/brazil-cyberwellness-profile/

30/01/2018 www.pdf-archive.com