Here's a map of the spam-sending botnets in 2010.
以下便是2010年整理的垃圾邮件制造者——僵尸网络的分布地图。
As we mentioned above, 88% of all spam is sent from botnets.
正如前面提到的,88%的垃圾邮件都来自于僵尸网络。
Botnets continue to proliferate, despite recent botnet takedowns.
虽然近期在拆卸僵尸网络,但它仍旧继续激增。
They send the spam from "botnets", networks of hacked personal computers.
他们利用僵尸网络(就是被挟持的个人电脑组成的网络)发送垃圾邮件。
Botnets are typically controlled by an attacker via Internet Relay Chat.
僵尸网络通常由攻击者通过Internet多线交谈(IRC)控制。
Botnets using Web 2.0 technology via social networks also are on the rise.
而使用Web2.0技术通过社会化网络传播的僵尸网络数量正不断增长。
Another interesting application was created to identify botnets for email spam.
另外一个有趣的应用程序被创建用于识别僵尸网络的垃圾邮件。
In this paper, we introduce a methodology to analyze and mitigate P2P botnets.
在本文中,我们介绍了分析和处理P 2 P僵尸网络的一种方法。
In response, senders started using botnets (networks of otherwise innocent computers).
作为对策,垃圾邮件发送者们开始使用僵尸网络(由另外一些“无辜”的计算机构成的网络)。
It is becoming easier to identify botnets and to spot the clever and scary ones quickly.
识别并进而迅速发现那些既狡猾又令人害怕的“僵尸网络”正变得愈加容易。
As you can see, Europe, especially Eastern Europe, has become a major hotbed for botnets.
正如你所见,欧洲尤其是东欧,已经逐步成为僵尸网络的聚合之地。
Since botnets pose such a powerful threat, we need a variety of mechanisms to counter it.
由于僵尸网络造成了这样大的威胁,我们需要各种机制来应对它们。
Botnets, viruses, keyloggers and other malware became an increasing threat to operations.
僵尸网络、病毒、键盘记录器和其它恶意软件给运营带来越来越大的威胁。
Even in unskilled hands, it should be obvious that botnets are a loaded and powerful weapon.
即使是不熟练的新手,僵尸网络很显然是一个强有力的攻击武器。
The number of global spam is growing, often spread through the rapid growth of large botnets.
全球垃圾邮件数量正不断增长,经常通过快速壮大的大型僵尸网络进行传播。
Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.
Akamai还研究了僵尸网络和网络攻击的主要流量来源地。
In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.
这里,我们对僵尸网络,普遍的攻击技术以及涉及到的个人做一个更贴近的观察。
Organized and controlled as botnets, these systems are essentially Internet weapons of mass destruction.
有组织的或受控作为僵尸网络,这些系统本质上是Internet大规模杀伤武器。
The infected machines thus comprise one of the biggest "botnets" – a network of "robot" computers – in internet history.
受到感染的机器将会组成Internet史上最大的"Botnets"(僵尸网络) - 由"机器人"电脑组成的网络。
Initially the FBI said it wanted to track down infected computers in the botnets it had identified and warn their owners.
最初,FBI表示,它希望在僵尸网络中追捕到它已确定并警告过其拥有人的那些受感染电脑。
In the future, we hope to develop more advanced honeypots that help us to gather information about threats such as botnets.
将来,我们希望开发更高级的蜜罐来帮助我们收集关于像僵尸网络这样的威胁。
When filters blocked mail from suspect network addresses, the spammers used botnets (networks of hijacked computers) instead.
当过滤器开始阻拦从嫌疑网络地址发来的邮件,发送者开始在其中放入僵尸网络(劫持电脑的网络)。
It provide a clear example for how smartphones are prime targets to become botnets once connected to a user's personal computer.
这说明一旦智能手机连到用户的个人电脑上之后,很容易成为僵尸网络的主要攻击对象。
Most troubling of all, Botezatu predicts that unsecured XP machines of all kinds will be compromised by hackers to form new botnets.
博泰扎图认为,最令人担忧的是,各种不安全的XP电脑可能会被黑客改造成新的僵尸网络。
Every article that I read about botnets mentions that this problem is here for the long haul, stating simple economics as the reason.
我阅读的每一篇有关僵尸网络的文章都提到,这个问题在有关僵尸阅读这里拖了很久,说明了简单的经济学原因。
Botnets are mention problem reason big business, making people a great deal of money, and as long as that's the case botnets aren't going away.
僵尸网络是大经济学说明僵尸业务,使人发财,只要这种情况持续,僵尸网络就不会消业务发财这种失。
The main problem with hashcash is that many spammers use "botnets", or hacked computers that have been reprogrammed to obey the spammer's commands.
hashcash的主要问题是很多垃圾信息散布者都会使用“botnet”,或是被黑客攻击了的计算机,这些计算机已经被重新编程,会服从垃圾信息散布者的命令。
To improve the confidentiality of Botnet, the authors proposed a dynamic Botnet model described with directed graph, which can accommodate various Botnets.
为提高僵尸网络的隐秘性,提出了一种动态僵尸网络模型,利用有向图进行描述,可以表示不同类型的僵尸网络。
In this paper we have attempted to demonstrate how honeynets can help us understand how botnets work, the threat they pose, and how attackers control them.
在本文中,我们试图说明蜜网如何帮助我们理解僵尸网络的工作方式,它们造成的威胁,攻击者如何控制它们等。
In this paper we have attempted to demonstrate how honeynets can help us understand how botnets work, the threat they pose, and how attackers control them.
在本文中,我们试图说明蜜网如何帮助我们理解僵尸网络的工作方式,它们造成的威胁,攻击者如何控制它们等。
应用推荐