Refine
Departments, institutes and facilities
- Institut für Cyber Security & Privacy (ICSP) (13) (remove)
Document Type
- Conference Object (10)
- Article (2)
- Book (monograph, edited volume) (1)
Year of publication
- 2013 (13) (remove)
Language
- English (13) (remove)
Has Fulltext
- no (13)
Keywords
- Analysis (1)
- Botnets (1)
- Certificates (1)
- Cloud (1)
- Component Models (1)
- Conficker (1)
- Countermeasures (1)
- Cryptography (1)
- Cyber Attacks (1)
- Cyber Security (1)
- Cybercrime (1)
- Cybercrime Legislation (1)
- HTTPS (1)
- Human-Robot Interaction (1)
- Machine Learning (1)
- Malware (1)
- Malware analysis (1)
- People Detection (1)
- Power Analysis (1)
- Public Key Infrastructure (1)
- RGB-D (1)
- Reusable Software (1)
- Robotics (1)
- SOA (1)
- SOAP (1)
- Security Approaches (1)
- Software Architectures (1)
- Stuxnet (1)
- Support Vector Machine (1)
- Tactical Wireless Multi-hop Networks (1)
- Template Attacks (1)
- WS-Security (1)
- Web Security (1)
- Workflow (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XSpRES (1)
- cooperation (1)
- web services (1)
Botnets
(2013)
Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. (Verlagsangaben)