Implementation of containment policies for Gateways to disarm real-time botnet attacks (P-0566) (MFN 3592)

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Fahad Asad, 01-133092-123
dc.date.accessioned 2017-08-26T10:52:04Z
dc.date.available 2017-08-26T10:52:04Z
dc.date.issued 2013
dc.identifier.uri http://hdl.handle.net/123456789/4575
dc.description Supervised by Mr. Waqar Ahmed en_US
dc.description.abstract Hackers and their botnets are constantly rattling virtual doors looking for easy target/prey. A botnet is a group of machines infected by some Trojan horse. The Trojan horse has been coded in such a way that it infects other computers. These machines without the knowledge of its owners have been set up to forward transmissions to other computers on the Internet. Each such infected device is known as a bot or zombie and is created when a computer is penetrated by software from a malware distribution; otherwise known as malware. Criminals typically use bots to infect large numbers of computers and use botnets to send out spam email messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraudulent activity. en_US
dc.language.iso en en_US
dc.publisher Software Engineering, Bahria University Engineering School Islamabad en_US
dc.relation.ispartofseries BSE;P-0566
dc.subject Software Engineering. en_US
dc.title Implementation of containment policies for Gateways to disarm real-time botnet attacks (P-0566) (MFN 3592) en_US
dc.type Project Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account