您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Modeling Peer-to-Peer Botnets

  2. Peer-to-peer botnets are a relatively new yet rapidly growing Internet threat. In the year since its introduction in January 2007, the Storm Worm peer-to-peer botnet has become the largest botnet on the Internet. Unlike previous botnets operating ov
  3. 所属分类:网络基础

    • 发布日期:2010-05-01
    • 文件大小:947200
    • 提供者:borelist
  1. Measurements and Mitigation of Peer-to-Peer-based Botnets - A Case Study on Storm Worm

  2. Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised machines connect to the central server and wait for commands. However, t
  3. 所属分类:网络基础

    • 发布日期:2010-05-01
    • 文件大小:1043456
    • 提供者:borelist
  1. Analysis of the Storm and Nugache Trojans--P2P is here

  2. Since the advent of distributed intruder tools in the late 1990s, defenders have striven to identify and take down as much of the attack network as possible, as fast as possible.This has never been an easy task, owing in large part to thewide distri
  3. 所属分类:C

    • 发布日期:2010-05-01
    • 文件大小:278528
    • 提供者:borelist
  1. Storm Worm Process Injection

  2. Storm Worm Process Injection from the Windows Kernel.
  3. 所属分类:其它

    • 发布日期:2010-08-16
    • 文件大小:128000
    • 提供者:windove
  1. Storm Worm & Botnet Analysis

  2. Analysis report for storm worm && botnet
  3. 所属分类:其它

    • 发布日期:2008-10-15
    • 文件大小:911360
    • 提供者:Kendiv