Insights from terrorism intelligence and eradication efforts-Al-Qaeda, ISIS, Boko Haram-for more pragmatic botnet countermeasures

EC Ogu, MI Ogu, C Ogu - International Journal of …, 2016 - inderscienceonline.com
EC Ogu, MI Ogu, C Ogu
International Journal of Collaborative Intelligence, 2016inderscienceonline.com
Bots are fast becoming the infamous insurgents lurking around network infrastructures and
the internet, with arguably at least one of such compromised machines sitting in homes and
offices around the world. These malicious network tenants have shown similar resilience to
such real-life terrorist networks as ISIS, Al-Qaeda, Boko Haram, and other armed conflict
groups. This paper discusses perspectives, and provides insights into how Botnets are not
very different from real-life terrorist networks, and why similar efforts to those which have …
Bots are fast becoming the infamous insurgents lurking around network infrastructures and the internet, with arguably at least one of such compromised machines sitting in homes and offices around the world. These malicious network tenants have shown similar resilience to such real-life terrorist networks as ISIS, Al-Qaeda, Boko Haram, and other armed conflict groups. This paper discusses perspectives, and provides insights into how Botnets are not very different from real-life terrorist networks, and why similar efforts to those which have been used to laudably impair and destabilise terrorist networks globally can equally be applied towards ridding network infrastructures and the internet of these malignant insurgents (especially those of the order of sophistication of Conficker). A review of existing literature juxtaposed with verifiable facts put together from an interpretivist and analytical standpoint, form the crux of the methodology that is used in investigating the cardinal discourse of this study.
Inderscience Online
以上显示的是最相近的搜索结果。 查看全部搜索结果