23 Hits in 4.9 sec

Analysis and Detection of Bot performing Keylogging Activities

Miss.Takale Jyoti D
Botnet is a malware controlled by a Botmaster using Command and Control (C&C). Botnet is expanded with infecting fresh computers through social networking sites like facebook, twitter, etc.  ...  The focus on computer security has increased due to the ubiquitous use of Internet. Botnets are one of the biggest cyber threats.  ...  ACKNOWLEDGMENTS For sound and safe building a strong foundation is prime requirement.Similarly for any project to be a great success a good guidance is required.  ... 
doi:10.24297/ijct.v13i6.2517 fatcat:vybyirqywrgnrhki2fzb4t3lqu

Survey and Research Challenges of Botnet Forensics

Anchit Bijalwan, Meenakshi Thapaliyal, Emmanuel S Piili, R. C. Joshi
2013 International Journal of Computer Applications  
These papers propose the advanced approach related botnet detection and analysis in the near future. It demonstrates a novel approach of botnet investigations and defense mechanisms.  ...  Botnet has recently been recognized as one of the most significant security threats/worms of the Internet.  ...  There are five phases in involve a botnet life cycle [7] . Primary infection is the first phase of botnet life cycle, where in a host is infected and becomes a possible bot.  ... 
doi:10.5120/13127-0483 fatcat:kre55acihzd3lb7sumar2mu7pu

Gaps in the Management and Use of Biometric Data: A Case of Zambian Public and Private Institutions

Melissa K. Chinyemba, Jackson Phiri
2018 Zambia ICT Journal  
Biometry, which is the analysis of these biometrics is a complex process but guarantees identification and non-repudiation.  ...  Biometrics are a unique measurement and analysis of the unique physiological special traits such as voice, eye structure and others that can be used in the discipline of varying person identification.  ...  Backdoor and Crimeware are typical examples of botnets that may compromise a computer network and either steal biometric data or corrupt such data.  ... 
doi:10.33260/zictjournal.v2i1.49 fatcat:pojl6c3krbfsbfr3kc5uj6ttbe

Cybercrime precursors: towards a model of offender resources [article]

Ki Hong Steve Chon, University, The Australian National, University, The Australian National
A purposeful sample of key frontline cybercrime responders (N=12) were interviewed about crimeware and their views of the activity observed in the discussion forums.  ...  Cybercrime is facilitated by crimeware, a specific type of computer software, and a focus on this element can help better understand how cybercrime evolves. Keywords: Cybercri [...]  ...  pre-empted by offenders creating a sort of iatrogenic cycle.  ... 
doi:10.25911/5d778a24d8836 fatcat:juofiyuoqjg4pp5mdejwrz3obq

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context: Executive Summary

R.V. Gundur, Michael Levi, Volkan Topalli
2021 CrimRxiv  
In addition, each section surveys the bodies and policies that are relevant to financial aspects of cybercrime and provides a critical review of the relevant literature.  ...  In both themes, authors prioritised examinations of the victim-facing parts of crimes (as opposed to what happens after a victim is victimised).  ...  to engage in cycles of criminality.  ... 
doi:10.21428/cb6ab371.dd7a1c57 fatcat:o3cpkyhqjffm3bdekxe5suaf3m

A Cyber-Kill-Chain based taxonomy of crypto-ransomware features

Tooska Dargahi, Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti, Giuseppe Bianchi, Loris Benedetto
2019 Journal in Computer Virology and Hacking Techniques  
e a t : h t t p:// u sir.s alfo r d. a c. u k/id/ e p ri n t/ 5 1 7 9 4/ P u b l i s h e d D a t e 2 0 1 9 U SIR is a di git al c oll e c tio n of t h e r e s e a r c h o u t p u t of t h e U niv e r  ...  Therefore, a ransomware feature taxonomy would advance cyber defenders' understanding of associated risks of ransomware.  ...  Installation After being successfully launched on the victim machine during the "exploitation" step, the next phase in the life-cycle of a ransomware attack is installation of the malicious binary payload  ... 
doi:10.1007/s11416-019-00338-7 fatcat:rjvlals56jclbei54t7pz2ra6q

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Acknowledgements This work was supported by the UK Home Office through a National Cyber Security Programme research grant. Research assistance was provided by Tessa Cole and David Flint.  ...  Gaining Crimeware-as-a-service Crimeware-as-a-service is one of the most advanced types of cybercrime whereby a buyer finds a vendor who arranges and conducts the actual crime.  ...  A total of 133 vendors responded to the surveys, with 57 vendors completing or nearly completing the full survey.  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq

A Survey on Ethical Hacking: Issues and Challenges [article]

Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab
2021 arXiv   pre-print
In other terms, pen testing is a simulated attack with the goal of identifying any exploitable vulnerability or/and a security gap.  ...  Therefore, in order to resist unknown vulnerabilities, a new kind of modern penetration tests is required, in addition to reinforcing the use of shadows honeypots.  ...  Ethical Hacking Life-cycle Ethical hacking life-cycle is closely similar to normal hacking life-cycle with only a slight difference based on the fact that ethical hackers aim to cause no harm nor damage  ... 
arXiv:2103.15072v1 fatcat:kqj6isalovdzbald3w2kxnqhbe

Cyber threats: taxonomy, impact, policies, and way forward

2022 KSII Transactions on Internet and Information Systems  
A variety of malware programs are often used as a primary weapon in these cyber threats.  ...  The continuous evolution and proliferation of computer technology and our increasing dependence on computer technology have created a new class of threats: "cyber threats."  ...  This botnet was entitled "King of the Underground Crimeware Toolkits" by Symantec [34] . information.  ... 
doi:10.3837/tiis.2022.07.017 fatcat:4rsov3b7fza5rk43lkoqhq4mpi

Building General Knowledge of Mechanisms in Information Security

Jonathan M. Spring, Phyllis Illari
2018 Philosophy & Technology  
a highly changeable domain that has been neglected within philosophy of science).  ...  This domain offers a fascinating novel constellation of challenges for building more general knowledge.  ...  Building General Knowledge of Mechanisms in Information Security Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (  ... 
doi:10.1007/s13347-018-0329-z fatcat:j7mtbljg4vcmrnwfa7xpu5hzcm

Cyberfraud and the implications for effective risk-based responses: themes from UK research

Michael Levi, Alan Doig, Rajeev Gundur, David Wall, Matthew Williams
2016 Crime, law and social change  
Notwithstanding, some areas of business risk have good commercial surveys by vendors and advisers.  ...  Easier access means a greater proportion of users than previously may be unfamiliar with technologies, making them 'easy targets' both as intermediaries for (e.g. botnets, money mules) and as victims of  ... 
doi:10.1007/s10611-016-9648-0 fatcat:zcewhs4b5jcq5c7hc5jc5qbq3q

On Contending with Unruly Neighbors in the Global Village: Viewing Information Systems as Both Weapon and Target

Wm. David Salisbury, David W. Miller, Lt Col Jason M. Turner
2011 Communications of the Association for Information Systems  
As an example, criminal and terrorist groups have demonstrated a sophisticated understanding of how to adapt organizational forms and information technologies to advance their agendas, regardless of how  ...  While information technologies we employ in business, government, and society have dramatically enhanced our ability to conduct commerce, the vulnerabilities of these systems create potential dangers not  ...  aided the development of this article.  ... 
doi:10.17705/1cais.02820 fatcat:w57mfclmkjf2pnlmsteiihu2ce

A Survey on Denial of Service Attack in Cloud Computing Environment

I Ramya, Ii Kesavaraj, Ii
International Journal of Advanced Research in Education & Technology (IJARET)   unpublished
In this paper, we provide a taxonomy of DOS attacks over a network based Cloud components in the cloud environment.  ...  The Denial of Service attack(DOS) which is a type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service.  ...  Cloud computing provides an extra processing buffer as needed at a low cost and without the capital investment or contingency fees to users. d) Shortened development life cycle -cloud computing adopts  ... 

Phishing Detection: A Literature Survey

Mahmoud Khonji, Youssef Iraqi, Andrew Jones
2013 IEEE Communications Surveys and Tutorials  
This paper aims at surveying many of the recently proposed phishing mitigation techniques.  ...  A high-level overview of various categories of phishing mitigation techniques is also presented, such as: detection, offensive defense, correction, and prevention, which we belief is critical to present  ...  Based on our review of the literature, we depict a flowchart describing the life-cycle of phishing campaigns from the perspective of anti-phishing techniques, which is intended to be the most comprehensive  ... 
doi:10.1109/surv.2013.032213.00009 fatcat:pkxukjfhbnad5kb52drs2vcqcq

Digital Forensic Analysis [chapter]

2016 Policing Digital Crime  
product or pass on malware SpamSoldier sending out SMS messages from Android OS phones Botnets A connected net of computers, controlled without the knowledge of the users Rustock botnet sending  ...  Additional data may be available from victim surveys (such as the Crime Survey for England and Wales; the Information Security Breaches Survey; the Oxford Internet Surveys; and the Internet Watch Foundation  ... 
doi:10.4324/9781315601083-14 fatcat:dfcfbcyqfjdkphuarpuks7qxjq
« Previous Showing results 1 — 15 out of 23 results