Network forensics: detection and mitigation of botnet malicious code via darknet

Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide networ...

Full description

Bibliographic Details
Main Authors: R. Othman, R. Azrina, A. Aziz, Normaziah
Other Authors: Ismail , Khalil
Format: Book Chapter
Language:English
English
Published: Atlantis Press 2012
Subjects:
Online Access:http://irep.iium.edu.my/28622/
http://irep.iium.edu.my/28622/
http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf
http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf
id iium-28622
recordtype eprints
spelling iium-286222013-02-13T10:44:17Z http://irep.iium.edu.my/28622/ Network forensics: detection and mitigation of botnet malicious code via darknet R. Othman, R. Azrina A. Aziz, Normaziah QA75 Electronic computers. Computer science Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide network continue to look for security control solutions to reduce exposure and magnitude of potential threats. However, with multi-user computers and distributed systems, the campus wide network often becomes a breeding ground for botnets. Atlantis Press Ismail , Khalil Mantoro, Teddy 2012 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf application/pdf en http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf R. Othman, R. Azrina and A. Aziz, Normaziah (2012) Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing. 1875-7669, 6 . Atlantis Press, Paris, France, pp. 65-78. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) http://link.springer.com/chapter/10.2991%2F978-94-91216-71-8_4?LI=true
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
R. Othman, R. Azrina
A. Aziz, Normaziah
Network forensics: detection and mitigation of botnet malicious code via darknet
description Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide network continue to look for security control solutions to reduce exposure and magnitude of potential threats. However, with multi-user computers and distributed systems, the campus wide network often becomes a breeding ground for botnets.
author2 Ismail , Khalil
author_facet Ismail , Khalil
R. Othman, R. Azrina
A. Aziz, Normaziah
format Book Chapter
author R. Othman, R. Azrina
A. Aziz, Normaziah
author_sort R. Othman, R. Azrina
title Network forensics: detection and mitigation of botnet malicious code via darknet
title_short Network forensics: detection and mitigation of botnet malicious code via darknet
title_full Network forensics: detection and mitigation of botnet malicious code via darknet
title_fullStr Network forensics: detection and mitigation of botnet malicious code via darknet
title_full_unstemmed Network forensics: detection and mitigation of botnet malicious code via darknet
title_sort network forensics: detection and mitigation of botnet malicious code via darknet
publisher Atlantis Press
publishDate 2012
url http://irep.iium.edu.my/28622/
http://irep.iium.edu.my/28622/
http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf
http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf
first_indexed 2023-09-18T20:42:10Z
last_indexed 2023-09-18T20:42:10Z
_version_ 1777409437222305792