Network forensics: detection and mitigation of botnet malicious code via darknet

Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide networ...

Full description

Saved in:
Bibliographic Details
Main Authors: R. Othman, R. Azrina, A. Aziz, Normaziah
Other Authors: Ismail , Khalil
Format: Book Chapter
Language:English
English
Published: Atlantis Press 2012
Subjects:
Online Access:http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf
http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf
http://irep.iium.edu.my/28622/
http://link.springer.com/chapter/10.2991%2F978-94-91216-71-8_4?LI=true
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
id my.iium.irep.28622
record_format dspace
spelling my.iium.irep.286222013-02-13T10:44:17Z http://irep.iium.edu.my/28622/ Network forensics: detection and mitigation of botnet malicious code via darknet R. Othman, R. Azrina A. Aziz, Normaziah QA75 Electronic computers. Computer science Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide network continue to look for security control solutions to reduce exposure and magnitude of potential threats. However, with multi-user computers and distributed systems, the campus wide network often becomes a breeding ground for botnets. Atlantis Press Ismail , Khalil Mantoro, Teddy 2012 Book Chapter REM application/pdf en http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf application/pdf en http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf R. Othman, R. Azrina and A. Aziz, Normaziah (2012) Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing. 1875-7669, 6 . Atlantis Press, Paris, France, pp. 65-78. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) http://link.springer.com/chapter/10.2991%2F978-94-91216-71-8_4?LI=true
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
R. Othman, R. Azrina
A. Aziz, Normaziah
Network forensics: detection and mitigation of botnet malicious code via darknet
description Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide network continue to look for security control solutions to reduce exposure and magnitude of potential threats. However, with multi-user computers and distributed systems, the campus wide network often becomes a breeding ground for botnets.
author2 Ismail , Khalil
author_facet Ismail , Khalil
R. Othman, R. Azrina
A. Aziz, Normaziah
format Book Chapter
author R. Othman, R. Azrina
A. Aziz, Normaziah
author_sort R. Othman, R. Azrina
title Network forensics: detection and mitigation of botnet malicious code via darknet
title_short Network forensics: detection and mitigation of botnet malicious code via darknet
title_full Network forensics: detection and mitigation of botnet malicious code via darknet
title_fullStr Network forensics: detection and mitigation of botnet malicious code via darknet
title_full_unstemmed Network forensics: detection and mitigation of botnet malicious code via darknet
title_sort network forensics: detection and mitigation of botnet malicious code via darknet
publisher Atlantis Press
publishDate 2012
url http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf
http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf
http://irep.iium.edu.my/28622/
http://link.springer.com/chapter/10.2991%2F978-94-91216-71-8_4?LI=true
_version_ 1643609530647445504