Searched for: subject%3A%22botnet%22
(1 - 8 of 8)
document
Gnanavarothayan, Kabilan (author)
The use of Internet of Things (IoT) devices has experienced an increase since its inception and is expected to continue to do so. However, this growth has also attracted individuals with malicious intentions. Botnet attacks on IoT devices have become more potent each year, exploiting new vulnerabilities and attacking more devices. Therefore, it...
master thesis 2023
document
Miedema, Fieke (author)
How did Avalanche, a botnet with an active lifetime of 8 years while serving 20+ malware families, ensure a smooth operation of business? Avalanche had the attention of security researchers and law enforcement, yet it managed to persevere for a long period of time.<br/>In this work, we answer this question by analyzing Avalanche’s security...
master thesis 2022
document
d' Estalenx, Antoine (author)
IoT devices keep entering our homes with the promise of delivering more services and enhancing user experience; however, these new devices also carry along an alarming number of vulnerabilities and security issues. In most cases, the users of these devices are completely unaware of the security risks that connecting these devices entail. Current...
master thesis 2021
document
Kamoen, Sille (author)
The number of Internet of Things devices, small low-powered devices with internet connectivity, is undergoing strong growth. As connected devices become the standard, more types of devices are connected to home networks and made accessible from the Internet for convenience. As IoT devices are widely deployed in mass numbers, they can be easily...
master thesis 2018
document
Jaspers Focks, Thijmen (author), van Veltom, Harvey (author), Wigmore, Viktor (author), Nguyen, Wing (author)
As the amount of digital content being shared is increasing, the need for a privacy protecting and resilient method of file sharing grows. New copyright law proposals are suggesting that governments and corporations are attempting to claim control over the use of the internet. As these new laws may lead to restrictions in digital content sharing...
bachelor thesis 2018
document
Heijligers, Jaap (author), van den Berg, René (author), Hoppenbrouwer, Mitchell (author)
Throughout this project two components have been created: Cloudomate and<br/>PlebNet. Cloudomate is a program that can purchase virtual private servers (VPS)<br/>from a number of providers with Bitcoin, it is accessed through a command line<br/>interface and published as Python library. PlebNet is the implementation of an<br/>autonomous self...
bachelor thesis 2017
document
Spruit, E.J.F. (author)
Cyber-crime is a large problem for society. OftenA botnet is used to for cybercrime. An infected machine is infected with a bot, this bot communicates with its controller. Other machines are infected with the same bot, which communicates with the same controller. These infected machines together form a zombie army of machines: the botnet. It is...
master thesis 2014
document
Asghari, H. (author)
master thesis 2010
Searched for: subject%3A%22botnet%22
(1 - 8 of 8)