Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Knowledge and Technology》 2010-12
Add to Favorite Get Latest Update

Botnet Analysis of The Working Mechanism

MA Wen-juan(Hunan International Economics University Experimental Center,Changsha 410205,China)  
Botnets After 10 years of development,already has a variety of communication and attack.It can capture the user without the knowledge of the host,in the theft of sensitive information,while the host to the network attacks.Botnet has the security of the Internet constitutes a serious threat.This paper briefly describes the development process of botnets and definition,focusing on analysis of botnets workflow,the final summary of botnets hazards and defense methods.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 SUN Yan-dong,LI Dong(Research Center of Computer Network and Information Content Security Technology,Harbin Institute of Technology,Harbin Heilongjiang 150001,China);Overview of Botnet[J];Journal of Computer Applications;2006-07
2 Zhang Xi Tang Heping(Electronic Engeering Institute,Hefei 230037);Study on Botnet Based on P2P[J];Computer & Digital Engineering;2009-02
3 ZHUGE Jian-Wei1, HAN Xin-Hui1, ZHOU Yong-Lin2, YE Zhi-Yuan1, ZOU Wei1+ 1(Institute of Computer Science and Technology, Peking University, Beijing 100871, China) 2(National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China);Research and Development of Botnets[J];Journal of Software;2008-03
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 SHEN Li-xiang(School of Computer & Information Engineering,Changzhou Institute of Technology,Changzhou 213002);The Analysis of Botnet Transmission Model and the Prevention & Cure Methods[J];Journal of Changzhou Institute of Technology;2008-06
2 ZOU Benna(Party School of CPC Huludao Municipal Committee,Anshan 125000);A Discussion of the Botnet Network Attack[J];Computer Programming Skills & Maintenance;2009-02
3 ZHANG Yu-xiang,SUN Ji-yin(The Second Artillery Engineering College,Xian 710025,China);HoneyNet-Based Military Information Networks Proactive Defense Capability Implementation[J];Computer and Information Technology;2008-05
4 XIAO Bin1,ZHANG Yan1,WANG Yong-yi2(1.Hefei Cable Television Broadband Network co,.Ltd.,Hefei 230001,China;2.Network Department of Electronic Engineering Institute,Hefei 230001,China);Study on Propagation and Control of Massive Botnet Based on Worms[J];Computer and Information Technology;2009-03
5 ZHANG Hui (Shandong Police College,Jinan 250014,China);Detection and Tracking Botnet[J];Computer Knowledge and Technology(Academic Exchange);2007-19
6 JIA Hua-ping (Department of Computer Science, Weinan Teachers College, Weinan 714000, China);Harm and the Botnet Coping Strategies[J];Computer Knowledge and Technology;2008-04
7 LIN Yong(Yunnan Jiaotong College,Kunming 650501,China);Discussion of The BotNet[J];Computer Knowledge and Technology;2009-17
8 LI Bo , FEI Yao-ping , LI Min (Department of Information Science and Engineering, Central South Univercity, Changsha,Hunan 410083,China);Analysis common signature[J];Computer Security;2009-07
9 ZHANG Wen-lin , QIAN Bu-ren (Department of mechanical and electrical Engineering, China University of Petroleum-Beijing, Beijing 102249, China);BotNet Tool Analysis[J];Computer Security;2009-07
10 SUN Chang-hua,LIU Bin(Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);Survey on New Solutions Against Distributed Denial of Service Attacks[J];Acta Electronica Sinica;2009-07
【Secondary Citations】
Chinese Journal Full-text Database 3 Hits
1 SUN Yan-dong,LI Dong(Research Center of Computer Network and Information Content Security Technology,Harbin Institute of Technology,Harbin Heilongjiang 150001,China);Overview of Botnet[J];Journal of Computer Applications;2006-07
2 WEN Wei-Ping1,2,3+, QING Si-Han1,2,3, JIANG Jian-Chun1,2,3, WANG Ye-Jun1,2,3 1(Institute of Software, The Chinese Academy of Sciences, Beijing 100080, China) 2(Engineering Research Center for Information Security Technology, The Chinese Academy of Sciences, Beijing 100080, China) 3(Graduate School, The Chinese Academy of Sciences, Beijing 100039, China);Research and Development of Internet Worms[J];Journal of Software;2004-08
3 ZHUGE Jian-Wei1, HAN Xin-Hui1, ZHOU Yong-Lin2, YE Zhi-Yuan1, ZOU Wei1+ 1(Institute of Computer Science and Technology, Peking University, Beijing 100871, China) 2(National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China);Research and Development of Botnets[J];Journal of Software;2008-03
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved