Network forensics: detection and mitigation of botnet malicious code via darknet
Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide networ...
| Main Authors: | , |
|---|---|
| Other Authors: | |
| Format: | Book Chapter |
| Language: | English English |
| Published: |
Atlantis Press
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28622/ http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf |
| _version_ | 1848779993966968832 |
|---|---|
| author | R. Othman, R. Azrina A. Aziz, Normaziah |
| author2 | Ismail , Khalil |
| author_facet | Ismail , Khalil R. Othman, R. Azrina A. Aziz, Normaziah |
| author_sort | R. Othman, R. Azrina |
| building | IIUM Repository |
| collection | Online Access |
| description | Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide network continue to look for security control solutions to reduce exposure and magnitude of potential threats. However, with multi-user computers and distributed systems, the campus wide network often becomes a breeding ground for botnets. |
| first_indexed | 2025-11-14T15:26:36Z |
| format | Book Chapter |
| id | iium-28622 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English English |
| last_indexed | 2025-11-14T15:26:36Z |
| publishDate | 2012 |
| publisher | Atlantis Press |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-286222013-02-13T10:44:17Z http://irep.iium.edu.my/28622/ Network forensics: detection and mitigation of botnet malicious code via darknet R. Othman, R. Azrina A. Aziz, Normaziah QA75 Electronic computers. Computer science Computer malwares are major threats that always find a way to penetrate the network, posing threats to the confidentiality, integrity and the availability of data. Network-borne malwares penetrate networks by exploiting vulnerabilities in networks and systems. IT administrators in campus wide network continue to look for security control solutions to reduce exposure and magnitude of potential threats. However, with multi-user computers and distributed systems, the campus wide network often becomes a breeding ground for botnets. Atlantis Press Ismail , Khalil Mantoro, Teddy 2012 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf application/pdf en http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf R. Othman, R. Azrina and A. Aziz, Normaziah (2012) Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing. 1875-7669, 6 . Atlantis Press, Paris, France, pp. 65-78. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) http://link.springer.com/chapter/10.2991%2F978-94-91216-71-8_4?LI=true |
| spellingShingle | QA75 Electronic computers. Computer science R. Othman, R. Azrina A. Aziz, Normaziah Network forensics: detection and mitigation of botnet malicious code via darknet |
| title | Network forensics: detection and mitigation of botnet malicious code via darknet |
| title_full | Network forensics: detection and mitigation of botnet malicious code via darknet |
| title_fullStr | Network forensics: detection and mitigation of botnet malicious code via darknet |
| title_full_unstemmed | Network forensics: detection and mitigation of botnet malicious code via darknet |
| title_short | Network forensics: detection and mitigation of botnet malicious code via darknet |
| title_sort | network forensics: detection and mitigation of botnet malicious code via darknet |
| topic | QA75 Electronic computers. Computer science |
| url | http://irep.iium.edu.my/28622/ http://irep.iium.edu.my/28622/ http://irep.iium.edu.my/28622/1/Book-Chapter-published-NetworkForensic-Darknet.pdf http://irep.iium.edu.my/28622/2/TrustworthyUbiquitousComputing.pdf |