Network forensics: detection and mitigation of botnet malicious code via darknet
Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide networ...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English English |
Published: |
Atlantis Press
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/28622/ http://irep.iium.edu.my/28622/ http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf |
id |
iium-28622 |
---|---|
recordtype |
eprints |
spelling |
iium-286222013-02-13T10:44:17Z http://irep.iium.edu.my/28622/ Network forensics: detection and mitigation of botnet malicious code via darknet R. Othman, R. Azrina A. Aziz, Normaziah QA75 Electronic computers. Computer science Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide network continue to look for security control solutions to reduce exposure and magnitude of potential threats. However, with multi-user computers and distributed systems, the campus wide network often becomes a breeding ground for botnets. Atlantis Press Ismail , Khalil Mantoro, Teddy 2012 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf application/pdf en http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf R. Othman, R. Azrina and A. Aziz, Normaziah (2012) Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing. 1875-7669, 6 . Atlantis Press, Paris, France, pp. 65-78. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) http://link.springer.com/chapter/10.2991%2F978-94-91216-71-8_4?LI=true |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science R. Othman, R. Azrina A. Aziz, Normaziah Network forensics: detection and mitigation of botnet malicious code via darknet |
description |
Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide network continue to look for security control solutions to reduce exposure and magnitude of potential threats. However, with multi-user computers and distributed systems, the campus wide network often becomes a breeding ground for botnets. |
author2 |
Ismail , Khalil |
author_facet |
Ismail , Khalil R. Othman, R. Azrina A. Aziz, Normaziah |
format |
Book Chapter |
author |
R. Othman, R. Azrina A. Aziz, Normaziah |
author_sort |
R. Othman, R. Azrina |
title |
Network forensics: detection and mitigation of botnet malicious code via darknet |
title_short |
Network forensics: detection and mitigation of botnet malicious code via darknet |
title_full |
Network forensics: detection and mitigation of botnet malicious code via darknet |
title_fullStr |
Network forensics: detection and mitigation of botnet malicious code via darknet |
title_full_unstemmed |
Network forensics: detection and mitigation of botnet malicious code via darknet |
title_sort |
network forensics: detection and mitigation of botnet malicious code via darknet |
publisher |
Atlantis Press |
publishDate |
2012 |
url |
http://irep.iium.edu.my/28622/ http://irep.iium.edu.my/28622/ http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf |
first_indexed |
2023-09-18T20:42:10Z |
last_indexed |
2023-09-18T20:42:10Z |
_version_ |
1777409437222305792 |