2013
DOI: 10.1007/978-1-4471-5216-3
|View full text |Cite
|
Sign up to set email alerts
|

Botnets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 0 publications
0
2
0
1
Order By: Relevance
“…They are defined legal frameworks in which ISPs operate and include cyber-security laws and regulations, blacklisting, peer pressure, reputation effects, competitive cost pressure, cost of customer acquisition, and cost of technology mitigation [17]. Regulation -an effective incentive [18] -requires cyber security incidents be nationally mitigated [19] since national anti-botnet centre usually are hardly infected. National initiatives on botnet mitigation should therefore be promoted and good models circulated [20] while policy makers give ISPs more incentives for taking action [2].…”
Section: Institutional Incentivesmentioning
confidence: 99%
“…They are defined legal frameworks in which ISPs operate and include cyber-security laws and regulations, blacklisting, peer pressure, reputation effects, competitive cost pressure, cost of customer acquisition, and cost of technology mitigation [17]. Regulation -an effective incentive [18] -requires cyber security incidents be nationally mitigated [19] since national anti-botnet centre usually are hardly infected. National initiatives on botnet mitigation should therefore be promoted and good models circulated [20] while policy makers give ISPs more incentives for taking action [2].…”
Section: Institutional Incentivesmentioning
confidence: 99%
“…There are different kinds of blacklisting, although generally all blacklisting systems have a database of nodes from which any communication is refused (Tiirmaa-Klaar, Gassen, Gerhards-Padilla, & Martini, 2013). Blacklisting could be used in TOR to prevent known assailants from connecting to the network.…”
Section: Blacklistingmentioning
confidence: 99%
“…Botnets podem se comportar como verdadeiras ameaças cibernéticas à globalização digital, uma vez que podem ser usadas para negar acesso a serviços online ou até mesmo roubar e destruir informações [1].…”
Section: Introductionunclassified