Attack of the Foreign Botnets

June 2007
Security: Solutions for Enterprise Security Leaders;Jun2007, Vol. 44 Issue 6, p46
Trade Publication
The article offers tips on how to protect computer networks from distributed denial of service (DDoS) attacks. According to the author, many Internet service providers offer DDoS mitigation devices on their networks. The author suggests that the most effective prevention against the attack is to make sure they never enter a network in the first place, and that the most effective DDoS mitigation service providers have global reach.


Related Articles

  • Good Guys Bring Down the Mega-D Botnet. Larkin, Erik // PCWorld;Feb2010, Vol. 28 Issue 2, p41 

    The article looks at how FireEye employees led by Atif Mushtaq defeated the Mega-D malware from infecting clients' networks. The botnet is powerful and resilient, which has infected 250,000 personal computers. Mushtaq and his colleagues targeted the command infrastructure of the botnet with a...

  • From Threat Detection to Information Protection. Paquette, Mike // Security: Solutions for Enterprise Security Leaders;Jun2007, Vol. 44 Issue 6, p50 

    The article focuses on the issue concerning computer security in relation to malware. It defines the potentials of malware in attacking computers, and cites some forms of malware such as keystroke loggers and screen-scrapers. According to the author, the computer attacks of today begin with...

  • HOW CLOSE IS WORLD WAR 3.0? Marsan, Carolyn Duffy // Network World;8/27/2007, Vol. 24 Issue 33, p1 

    The article reports on the cyber-attacks that hit the government in Estonia. It was considered as the first occurrence of modern cyberwarfare. It interrupted many government web sites and networks, financial institutions and media outlets that were run by Internet Service Provider Networks...

  • Cyberwarfare.  // Background Information Summaries;5/ 3/2012, p2 

    Cyberwarfare comprises a relatively new national security threat occasioned by the rapid spread of computer technology in both military operations and the civilian economy. U.S. government reports have suggested that China in particular appears to be actively developing capabilities to disrupt...

  • The new Cold War. Wattanajantra, Asavin // SC Magazine: For IT Security Professionals (UK Edition);Nov/Dec2012, p18 

    The author investigates whether the rise and discovery of several offensive practices, such as computer network espionage and surveillance among nations, implicate a new Cold War. It details the discovery of the malware Flame and Stuxnet, which have been speculated as a joint effort developed by...

  • Cluster based Statistical Anomaly Intrusion Detection for Varied Attack Intensities. Thangavel, M.; Thangaraj, P. // International Journal of Computer Applications;Jun2011, Vol. 24, p27 

    In today's Internet paradigm, the type of intrusion attacks becomes crucial in presenting effective improvement to anomaly intrusion attacks. Anomaly Traffic hacker attacks combined with traditional network intruders was a serious threat to network security. The existing work on intrusion...

  • Towards the Epidemiological Modeling of Computer Viruses. Xiaofan Yang; Lu-Xing Yang // Discrete Dynamics in Nature & Society;2012, Special section p1 

    Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that computer viruses spread on networks. This paper is intended to establish a series of rational epidemic models of computer viruses. First, a close inspection of some common characteristics shared by...

  • DYNAMIC STRATEGY FOR BOTNET DETECTION USING BBA. Dwivedi, Sanjeev Kumar; Prakash, Om; Keshari, Surendra Kumar; Muthumanickam, K. // Far East Journal of Electronics & Communications;2016 Special Volume, Vol. 3, p307 

    Apart from well known malwares viruses, worms and Trojan houses; there is less familiar threat known as the botnet. The term botnet (network of bots) is a combination of two words: bot (victim host) and net (network). In relation of botnet taxonomy bot is referred as a victim host which is under...

  • THE RETOOLING OF THE END-POINT SECURITY SOFTWARE MARKET. Oltsik, Jon // Information Security;Jul2015, Issue 6, p13 

    The article discusses the launch of endpoint security software to address the increasing cyberattacks. Topics covered include the rising demands of companies and individuals for layered security technologies. Also mentioned is the views of technology experts of the rising overall malware threats...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics